SonicJobs Logo
Left arrow iconBack to search

Security Engineer, Incident Response

LTK
Posted a month ago, valid for a month
Salary

Competitive

Contract type

Full Time

By applying, a SHOPLTK account will be created for you. SHOPLTK's Privacy Policy will apply.

SonicJobs' Terms & Conditions and Privacy Policy also apply.

Sonic Summary

info
  • We are looking for a Security Operations Engineer to help protect LTK’s infrastructure, data, and users.
  • The ideal candidate should have at least 3 years of experience in security operations or incident response roles.
  • This remote-friendly position involves monitoring security events, managing incident responses, and improving detection processes.
  • Experience with SIEM tools like Splunk and strong analytical skills are essential for this role.
  • Salary details are not specified, but industry certifications such as GCIH, GCFA, or Security+ are advantageous.

We are seeking a Security Operations Engineer to join our team and help safeguard LTK’s infrastructure, data, and users. The ideal candidate has hands-on experience in incident response (IR), strong analytical skills, and a passion for learning and growing in the security space. This is a remote-friendly position. Responsibilities include monitoring security events and incidents to detect potential threats and vulnerabilities using tools like Splunk and other SIEM platforms; supporting response to security incidents and managing the incident response process end-to-end; implementing and monitoring security measures to protect LTK’s infrastructure and assets; creating and maintaining incident response policies, standards, and runbooks; continuously improving detection and response processes to strengthen investigations and remediation; communicating risk and impact to engineering and business leaders to drive fast and effective remediation; performing proactive threat hunting based on internal telemetry and threat intelligence; conducting root cause analysis (RCA) and post-incident reviews to drive learning and improvement; tracking and reporting on incident metrics to improve response plans and identify gaps; staying current on emerging threats, vulnerabilities, and incident response and detection best practices; participating in the on-call rotation for security incident handling; driving automation and tool integration to scale security operations; supporting vulnerability remediation efforts in partnership with engineering and infrastructure teams; assisting with audits and assessments to meet regulatory and compliance requirements; developing and conducting security incident training, including tabletop exercises and dry runs. Requirements include 3+ years of experience in a security operations or incident response role; experience with SIEM tools similar to Splunk, ELK, log analysis, and triaging alerts; strong problem-solving skills and the ability to make decisions under pressure; remote work experience and ability to collaborate effectively across time zones; initiative to learn, openness to feedback, and a strong growth mindset; industry certifications such as GCIH, GCFA, Security+, or equivalent are a plus.




Learn more about this Employer on their Career Site

Apply now in a few quick clicks

By applying, a SHOPLTK account will be created for you. SHOPLTK's Privacy Policy will apply.

SonicJobs' Terms & Conditions and Privacy Policy also apply.