<div class="content-intro"><p><strong>REIMAGINE TRUST</strong></p><p>Incode is the leading provider of world-class identity solutions that is reinventing the way humans authenticate and verify their identities online to power a world of digital trust.</p><p>Through our revolutionary identity solutions, we are unleashing the business potential of universal industries including finance, government, retail, hospitality, gaming and more, by reducing fraud and transforming human interactions with data, products, and services.</p><p>We’re in the process of rapidly scaling our diverse global team and we’re looking for entrepreneurial individuals and leaders who are curious, driven, and excited by ownership to join a Unicorn-status scale-up!</p></div><p><strong><span data-contrast="none">The Opportunity</span></strong><span data-ccp-props="{"335551550":6,"335551620":6}"> </span></p><p><span data-contrast="none">We seek a trustworthy and proactive<strong> Mid/SR Security Engineer</strong> as a technical thought leader and driver of holistic security operations across Incode. As an early security hire at Incode, you will work across the security operations lifecycle for detection engineering and incident response, influence the security operations program development, and be the first line of defense through assessing threats, collecting and analyzing data, and responding to abnormal activities and events. In close collaboration with our security team members, the compliance team, the SRE team, and product engineering teams, we share the responsibility to identify, protect, detect, respond, and recover from cyber threats.</span><span data-ccp-props="{"335551550":6,"335551620":6}"> </span></p><p><span data-contrast="none">If you are a hands-on Security Engineer passionate about building high-signal detection strategies, conducting threat-hunting exercises, automating and enriching events, and leading our first line of defense across our corporate and product at Incode, we would love to chat with you. This is an exciting opportunity to shape and build security operations and influence our overall security strategy.</span><span data-ccp-props="{"335551550":6,"335551620":6}"> </span></p><p><strong><span data-contrast="none">Responsibilities</span></strong><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Be the first line of defense to protect, detect, respond to, and recover from cyber-attacks in both our corporate and product environments.</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Develop and run tools to gather security telemetry data from cloud production systems.</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Automate workflows and improve identification and response time for security events.</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Build and optimize high signal detections with enriched data and orchestration.</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Define and improve processes, procedures, and technologies used for detection and response.</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Develop runbooks and incident playbooks for new and existing detections and influence our security operations roadmap.</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Lead threat hunting practices, suggest product and infrastructure signals to surface attacks and incorporate findings into security controls.</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Research attacker tactics, techniques, and procedures (TTPs) and craft detections to quickly identify and contain potential security threats.</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Respond to security events, triage, perform investigations, incident analysis, and communicate clearly and efficiently with partners.</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Participate in an on-call rotation.</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Onboard new systems and services to SIEM and SOAR and build new detection pipelines.</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Facilitate incident response processes and tabletop exercises.</span><span data-ccp-props="{}"> </span></li></ul><p><strong><span data-contrast="none">Qualifications:</span></strong><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Experience as a security engineer, including security monitoring, detection engineering, incident response, and threat hunting in a SaaS company</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Practical understanding of common attacks, adversary tactics, techniques, and procedures (TTPs) and MITRE ATT&CK principles</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Operating systems internals and forensics experience for macOS, Windows & Linux</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Domain experience managing and working with current SIEM and SOAR platforms, DLP, email security platforms, endpoint protection platforms, secure service edge, etc.</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Experience developing tools and automation using common DevOps toolsets and programming languages</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Understanding of malware functionality and persistence mechanisms</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Ability to analyze endpoint, network, and application logs for anomalous events</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Proficiency in programming in Golang or Python</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Excellent collaborative skills</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Outstanding written and verbal communication</span><span data-ccp-props="{}"> </span></li></ul><p><strong><span data-contrast="none">Preferred Experience and Certification:</span></strong><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">SaaS Startup experience in security focused industries, such as fintech, security software and services, healthtech, identity and access management.</span><span data-ccp-props="{"201341983":0,"335559740":259}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Hands-on experience with data analysis, modeling, and correlation at scale</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Familiarity in continuous integration and Infrastructure as Code</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">Experience designing, and optimizing high throughput ETL pipelines</span><span data-ccp-props="{}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none"><span data-ccp-parastyle="Body Text">Possess a breadth of knowledge and experience across the information security domain, such as endpoint security, cloud security, application security, or </span><span data-ccp-parastyle="Body Text">automation</span></span><span data-ccp-props="{"134245417":false}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none"><span data-ccp-parastyle="Body Text">Experience as a software engineer</span><span data-ccp-parastyle="Body Text">, infrastructure engineer, or site reliability </span><span data-ccp-parastyle="Body Text">engineer</span><span data-ccp-parastyle="Body Text"> </span></span><span data-ccp-props="{"134245417":false}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="11" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none"><span data-ccp-parastyle="Body Text">Experience detecting or responding to threats in Kubernetes (K8s), AWS, and Linux </span><span data-ccp-parastyle="Body Text">environments</span></span><span data-ccp-props="{"134245417":false}"> </span></li><li data-leveltext="" data-font="Symbol" data-listid="11" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none"><span data-ccp-parastyle="Body Text">Certifications in </span><span data-ccp-parastyle="Body Text">Security, </span><span data-ccp-parastyle="Body Text">Incident Handling</span><span data-ccp-parastyle="Body Text">, Forensics,</span><span data-ccp-parastyle="Body Text"> and/or Offensive Security (</span><span data-ccp-parastyle="Body Text">eg.</span> <span data-ccp-parastyle="Body Text">CERT-CSIH</span><span data-ccp-parastyle="Body Text">, </span><span data-ccp-parastyle="Body Text">GCIH,</span><span data-ccp-parastyle="Body Text"> GCIA,</span><span data-ccp-parastyle="Body Text"> GCFA,</span> <span data-ccp-parastyle="Body Text">Security+, ECIH, </span><span data-ccp-parastyle="Body Text">GX-IH, OSCP, GPEN</span><span data-ccp-parastyle="Body Text">, </span><span data-ccp-parastyle="Body Text">CEH,</span><span data-ccp-parastyle="Body Text"> CISSP</span> <span data-ccp-parastyle="Body Text">etc</span><span data-ccp-parastyle="Body Text">).</span></span><span data-ccp-props="{"134245417":false}"> </span></li></ul><div class="content-conclusion"><p><strong>8 Aspects of our Culture:</strong></p><ul><li>Values are what we value</li><li>High performance</li><li>Freedom & responsibility</li><li>Context, not control</li><li>Highly aligned, loosely coupled</li><li>Continuous Feedback</li><li>Pay Top of Market</li><li>Promotions & Development</li><li>Learn more about <a href="https://incode.com/life-at-incode/"><strong>Life at Incode</strong></a><strong><u>!</u></strong></li></ul><p><strong>Benefits & Perks:</strong></p><ul><li>Meaningful Equity</li><li>Flexible Working Hours & Workplace</li><li>Open Vacation Policy</li><li>Wellness Program</li><li>International Travel Opportunities</li><li>Additional benefit package according to location (401k, medical insurance, etc.)</li></ul><p> </p><p> </p><p><strong>Equal Opportunities:</strong></p><p>Incode is an equal opportunity employer, committed to creating a diverse and inclusive work environment. We take great pride in having an inclusive, diverse, and global team and are always on the lookout for talented, passionate people from all backgrounds and walks of life.</p><p><strong>Applicant Data Privacy:</strong></p><p>We will only use your personal information in connection with Incode’s application, recruitment, and hiring processes.</p></div>