This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Help us use technology to make a big green dent in the universe! Kraken powers some of the most innovative global developments in energy. We’re a technology company focused on creating a smart, sustainable energy system. From optimising renewable generation, creating a more intelligent grid and enabling utilities to provide excellent customer experiences, our operating system for energy is transforming the industry around the world in a way that benefits everyone. It’s a really exciting time in energy. Help us make a real impact on shaping a better, more sustainable future.
Job Responsibility:
Monitoring, triaging, and investigation of security incidents on Kraken’s infrastructure and Client instances
Responding to alerts generated by our Security Information and Event Management (SIEM) system
Automating and continuously expanding the detection capabilities
Analysing application, Cloud and access logs and events to identify potential security threats and vulnerabilities and coding this analysis for future playbooks
Identifying where escalation of incidents, or notification to third parties may be required
Providing incident response support working with our engineering and product teams where necessary
Maintaining, improving and automating incident response processes and playbooks, to continually improve the team's capabilities
Preparing reports and incident summaries, as well as reviewing and improving the content and presentation of reports produced by the team
Maintaining and updating security incident documentation including analysis findings and recommended mitigation strategies, automating wherever possible
Liaising with stakeholders in relation to incident root cause and providing remediation/improvement recommendations
Participation in a roster covering weekends and public holidays to deliver a 24x7 operations capability
Requirements:
A strong Security Operations and technology background
Experience in using SIEM platforms to analyse and respond to security alerts
Familiarity with EDR (Endpoint Detection and Response) tools and their capabilities, including host containment and evidence preservation
Knowledge of best practices for analysing incidents and logs in a cloud environment
An understanding of how different mitigation strategies can contain and respond to security events
An understanding of Cloud and software architectures
Strong analytical and problem-solving skills, with the ability to identify, triage and mitigate incidents
Ability to clearly communicate and document incident activities
A passion for security, a drive to improve security alerting and response processes by harnessing technology and automation
Good experience in at least some of the areas mentioned above
Nice to have:
Experience working in a SOC or CERT that monitors multiple client infrastructure/instances
Experience with AWS environments including AWS security monitoring, logging (e.g., CloudTrail, GuardDuty)
Relevant certifications or qualifications related to Security Operations
Basic scripting or automation skills using SOAR tooling to optimise tasks and develop security automation workflows
What we offer:
Great medical, dental, and vision insurance options including FSAs
Paid time off
401(k) plan with employer match
Parental leave
Pre-tax commuter benefits
Flexible working environment
Equity Options
Modern office or co-working spaces depending on location