Bask Health
Security Operations Engineer (Threat Detection & Penetration Testing)
Bask Health, New York, New York, us, 10261
You will be leveraging your security operations experience to analyze and respond to security notifications, events, and inquiries. You will be performing initial triage of potential security incidents through log and data analysis to determine whether or not activity is a substantiated or valid threat, assessing severity and potential impact, taking pre-approved remediation measures to contain a threat, and escalating findings to investigators for further review and analysis. You will use your knowledge of cyber threats and the results of your analysis to coordinate with partner teams to improve threat detection through tuning and creation of new use cases, to improve capabilities through enriching existing data and creation of new data feeds, and to improve triage accuracy, consistency and timeliness through automation. This role plays a critical part in threat detection and response, ultimately reducing the likelihood of security breaches and protecting sensitive company information.
Analyze and investigate activity on company devices that could represent a security threat
Work cross-functionally with the Security teams to develop solutions for analyzing security events at scale and protecting Bask networks, systems, and data
Interpret disparate data sources to report on trends and support investigative requests
Collect requirements for enhancements to detection models and response systems
Leverage existing systems and data to perform analyses and promote process improvements
Provide actionable insights to help identify, prevent, detect, and respond to anomalous or potentially malicious user activity
Collaborate effectively with teammates, lead projects, mentor others, and develop and champion quality operational standards across the team Provide expert technical guidance on threat detection and penetration testing methodologies.
Drive the organizational security vision by prioritizing and overseeing the execution of projects aligned with our security roadmap.
Collaborate cross-functionally with security engineering teams to enhance detection systems, implement countermeasures, and ensure comprehensive protection of Stripe's networks, systems, and data.
Develop, document, and implement strategies, playbooks, and capabilities to advance our threat detection and penetration testing functions.
Continuously improve security processes by integrating feedback from penetration tests and threat detection activities into our security architecture. Coach and mentor individual contributors, championing a culture of learning and excellence within the team. Oversee
employee onboarding and offboarding
— creating and deactivating accounts, managing permissions, and ensuring smooth transitions. Maintain and improve
SSO / identity management
across platforms (Okta, Google SSO, etc.). Enforce
IT security standards : MFA, password policies, VPNs, credential rotation, and endpoint protection. Requirements 5+ years experience in information technology or cyber security roles including security operations/incident response 2+ years experience analyzing large data sets to solve problems and/or manage projects related to security event triage and/or workplace investigations B.S. or M.S. in Cyber Security and Information Assurance, Data Analytics, Computer Science or related field, or equivalent experience Working knowledge of SQL Experience managing
Google Workspace ,
SSO , and
IAM
systems. Basic knowledge of scripting or programming in Python and Kali Linux Advanced
Javascript knowledge (2+ years) Working knowledge of
AWS Lambda, EventBridge, DynamoDB, and SQS Proven experience with log querying and analysis (e.g. first or third party applications, system / data access, event logs), digital forensics, or incident response using one or more industry standard SIEM Platforms (Splunk, Sentinel, Chronicle, Elastic, etc.) Proficiency using analytical methods to inform detection systems or guide strategic response Strong cross-functional collaboration and written/verbal communication skills Ability to think creatively and holistically about identifying and reducing risk in a complex environment High level of judgment, objectivity, and discretion
Preferred qualifications
Prior experience working with high volume data in a security operations environment
Experience with data processing and analysis tools (e.g. Jupyter Notebooks, Databricks)
An adversarial mindset, understanding the goals, behaviors, and TTPs of threat actors
Ability to leverage threat intelligence and/or hunting concepts in an enterprise environment
Experience in one or more of the following areas: user and entity behavior analytics (UEBA), SOAR/security automation, security information event management (SIEM), data loss prevention (DLP), Information Security, or Data Privacy
One or more security certifications through a recognized industry provider: GIAC, ISACA, ISC2, OffSec, CompTIA, etc.
Work cross-functionally with the Security teams to develop solutions for analyzing security events at scale and protecting Bask networks, systems, and data
Interpret disparate data sources to report on trends and support investigative requests
Collect requirements for enhancements to detection models and response systems
Leverage existing systems and data to perform analyses and promote process improvements
Provide actionable insights to help identify, prevent, detect, and respond to anomalous or potentially malicious user activity
Collaborate effectively with teammates, lead projects, mentor others, and develop and champion quality operational standards across the team Provide expert technical guidance on threat detection and penetration testing methodologies.
Drive the organizational security vision by prioritizing and overseeing the execution of projects aligned with our security roadmap.
Collaborate cross-functionally with security engineering teams to enhance detection systems, implement countermeasures, and ensure comprehensive protection of Stripe's networks, systems, and data.
Develop, document, and implement strategies, playbooks, and capabilities to advance our threat detection and penetration testing functions.
Continuously improve security processes by integrating feedback from penetration tests and threat detection activities into our security architecture. Coach and mentor individual contributors, championing a culture of learning and excellence within the team. Oversee
employee onboarding and offboarding
— creating and deactivating accounts, managing permissions, and ensuring smooth transitions. Maintain and improve
SSO / identity management
across platforms (Okta, Google SSO, etc.). Enforce
IT security standards : MFA, password policies, VPNs, credential rotation, and endpoint protection. Requirements 5+ years experience in information technology or cyber security roles including security operations/incident response 2+ years experience analyzing large data sets to solve problems and/or manage projects related to security event triage and/or workplace investigations B.S. or M.S. in Cyber Security and Information Assurance, Data Analytics, Computer Science or related field, or equivalent experience Working knowledge of SQL Experience managing
Google Workspace ,
SSO , and
IAM
systems. Basic knowledge of scripting or programming in Python and Kali Linux Advanced
Javascript knowledge (2+ years) Working knowledge of
AWS Lambda, EventBridge, DynamoDB, and SQS Proven experience with log querying and analysis (e.g. first or third party applications, system / data access, event logs), digital forensics, or incident response using one or more industry standard SIEM Platforms (Splunk, Sentinel, Chronicle, Elastic, etc.) Proficiency using analytical methods to inform detection systems or guide strategic response Strong cross-functional collaboration and written/verbal communication skills Ability to think creatively and holistically about identifying and reducing risk in a complex environment High level of judgment, objectivity, and discretion
Preferred qualifications
Prior experience working with high volume data in a security operations environment
Experience with data processing and analysis tools (e.g. Jupyter Notebooks, Databricks)
An adversarial mindset, understanding the goals, behaviors, and TTPs of threat actors
Ability to leverage threat intelligence and/or hunting concepts in an enterprise environment
Experience in one or more of the following areas: user and entity behavior analytics (UEBA), SOAR/security automation, security information event management (SIEM), data loss prevention (DLP), Information Security, or Data Privacy
One or more security certifications through a recognized industry provider: GIAC, ISACA, ISC2, OffSec, CompTIA, etc.