Cadence Inc
Join to apply for the Senior Cybersecurity Engineer role at Cadence 3 weeks ago Be among the first 25 applicants Get AI-powered advice on this job and more exclusive features. At Cadence, we hire and develop leaders and innovators who want to make an impact on the world of technology. Summary Experienced Senior Cybersecurity Engineer with proficiency in next generation SIEM (Security Information and Event Management) that uses AI and threat intelligence to identify sophisticated threats and risks, global deployment and automation, programming and security operations background. Possesses deep technical expertise in IT environment and Cloud environment. Adept at leading incident detection and response efforts, committed to continuous improvement and staying abreast of the latest security threats and technologies. Key Skills SIEM (Security Information and Event Management): Hands-on expertise with Devo and/or Splunk, ability to build correlation using Devo/Splunk is essential. Deep understanding and experience in maintaining and optimizing SIEM rules. Developed dashboards and reports for SIEM data analysis. SOAR- Security Orchestration, Automation, and Response: Strong expertise in integrating SIEM with security automation and orchestration. Threat Intelligence: Skilled in gathering, analyzing, and disseminating threat intelligence to improve incident response capabilities. Used Devo Threat Intelligence Link. Scripting and Automation: Proficient in scripting languages (e.g., Python, PowerShell) for automating and integrating with Devo. Communication and Collaboration: Excellent communication skills to effectively convey incident status to stakeholders. Ability to communicate technical information to both technical and non-technical audiences. Demonstrated ability to collaborate effectively under tight deadlines and in crisis situations. Experience in performing security analytics to identify risks and define alerts for top risks which are actionable. Experience 3+ years of experience in SIEM (Devo, Splunk, etc.) administration roles is required. Led and managed numerous complex security incidents, including ransomware attacks, data breaches, and advanced persistent threats (APTs). Experience with scripting languages (Python, Bash, etc.). Developed and implemented security risk playbooks. Analyzed threat intelligence to proactively identify and mitigate potential threats. Provided recommendations to improve incident response efficiency by analyzing risk patterns. Implementation and management of Security Orchestration, Automation, and Response (SOAR) technologies. Education Bachelor's or master's degree in computer science, cybersecurity, or a related field. Relevant industry certifications (e.g., CISSP, GCIH, GCFA, OSCP). Responsibilities Maintain and optimize the SIEM system, automate, integrate, and configure it for performance, scalability, and security. Collaborate with security analysts (SOC team) to streamline security monitoring and notifications. Analyze threat intelligence and proactively hunt for threats. Contribute to the continuous improvement of security operations. Provide detailed reports to management on ongoing investigations. The annual salary range for California is $136,500 to $253,500. You may be eligible for incentive compensation including bonus, equity, and benefits. Compensation varies based on qualifications, skills, and location. Benefits include paid vacation and holidays, 401(k) with employer match, stock purchase plans, and various health plans. We're doing work that matters. Help us solve what others can't. Seniority level Mid-Senior level Employment type Full-time Job function Information Technology Industries Software Development #J-18808-Ljbffr