Logo
Fox

Security Operations Engineer

Fox, Los Angeles, California, United States, 90079

Save Job

Overview of the Company

Fox Corporation. Under the FOX banner, we produce and distribute content through brands including FOX News Media, FOX Sports, FOX Entertainment, FOX Television Stations and Tubi Media Group. We empower a diverse range of creators to imagine and develop culturally significant content, while building an organization that thrives on creative ideas, operational expertise and strategic thinking. Job Description

Are you ready to join a more agile organization where security operations and threat intelligence are designed to innovate rapidly and scale intelligently? Fox is evolving its Security Operations function by integrating advanced analytics, automation, and cyber threat intelligence. We are seeking a Security Operations Engineer with strong analytical instincts and an engineering mindset to elevate detection and response capabilities. In this hybrid role, you will actively monitor and investigate security events, lead incident response efforts, and refine detection strategies from an analyst perspective. You will apply engineering skills to build and enhance security tooling, deploy new technologies, and develop automated workflows that scale across the enterprise. You will help design and operationalize cyber adversary emulation capabilities to test and validate defenses, and track the evolving threat landscape to keep our security posture adaptive and intelligent. You will contribute at the intersection of operations and development to protect the business today and build the next generation of security infrastructure for tomorrow. This role is highly technical and ideal for someone who can interpret logs and threats and also design, implement, and automate systems that mitigate them. We are looking for someone who challenges conventional thinking and embraces innovation. At Fox, automation is core to our DNAwe use it to enrich data, orchestrate response, and scale remediation beyond what traditional teams can reach. A Snapshot of Your Responsibilities Serve as a key point of contact during major incidents, leading triage, containment, response, and mitigation efforts, and coordinating postmortem reviews and forensic investigations. Apply advanced knowledge of monitoring, analysis, detection, and response to develop efficient, scalable methods and technologies for triaging incidents and weaponizing threat hunting and adversary emulation capabilities. Design, build, and operationalize the Cyber Threat Intelligence (CTI) function, developing processes, tools, and data pipelines to collect, analyze, and operationalize threat intelligence across the enterprise. Lead the engineering, deployment, and maintenance of CTI platforms and integrations including threat feeds, enrichment pipelines, adversary behavior tracking systems, and intelligence-sharing solutions. Develop strategies for incident response and threat detection, focusing on identifying emerging threats, including those from sophisticated threat actors. Enhance automated mitigation and integrate real-time situational awareness into operations. Monitor EDR/IDS/IPS solutions for anomalies, conduct proactive threat hunts, generate and triage alerts, and drive response actions as part of 24x7 coverage. Participate in an on-call rotation to ensure continuous monitoring, response, and incident management capabilities. Evaluate and refine SOC policies, playbooks, and procedures, recommending improvements to optimize speed, accuracy, and collaboration. Develop and integrate new playbooks, use cases, and detection workflows across Security Operations and related teams. Configure and tune EDR, IDS/IPS, and other detection technologies to reduce noise and improve response efficiency. Evaluate emerging security technologies, conduct proof-of-concepts, and drive integration and adoption within the Fox security ecosystem. Collaborate with development and InfoSec engineering teams to build security automation workflows, enrichment pipelines, and mitigation scripts that scale. Gather, analyze, and assess the global threat landscape, providing actionable insights to leadership on evolving risks and adversary trends. Perform security testing and vulnerability assessments to identify strengths, weaknesses, and opportunities to improve the organization's security posture. Develop documentation, training materials, and intelligence briefings to support Security Operations and cross-functional engineering teams. Partner with business units to identify security requirements and perform risk assessments for new initiatives and technologies.

What You Will Need

7+ years of experience in Security Operations and Cyber Threat Intelligence (CTI) roles, with incident response, threat analysis, and intelligence-driven defense expertise. Certifications: GCIH, GSEC, or CySA+ (CTI-focused certifications such as GCTI or CTIA are a plus). Proven experience leading incident response efforts and reporting findings to stakeholders, including hands?on malware analysis. Mastery of core security technologies, including endpoint protection/EDR, SIEM, IPS/IDS, HIDS/NIDS, firewalls, WAFs, DNS security, and network monitoring tools. Expertise in developing and operationalizing CTI programs, including threat data ingestion, enrichment, and correlation with internal telemetry. Experience in adversary emulation, threat modeling, and intelligence mapping to MITRE ATT&CK or similar frameworks. Ability to design and maintain CTI infrastructure, including threat intel platforms (TIPs), automation pipelines, and intelligence-sharing integrations (STIX/TAXII, MISP). Collaborate with Security Engineering teams to enhance tools and workflows, including SOAR playbooks and automated response strategies. Partner with the Advanced Threats and Assessments team to mature threat monitoring and detection capabilities through data fusion, correlation, and automation. Strong understanding of cryptography, defense?in?depth practices, vulnerability management, malware analysis tools, and data loss prevention. Expert?level administration of Linux/Unix and Windows operating systems, with security hardening and log analysis experience. Experience mentoring and training other security professionals, fostering knowledge sharing and analytical rigor. A strong research mindset with ability to track evolving threat actors and translate intelligence into actionable defense measures. Excellent verbal and written communication skills, with ability to present Threat Intel reports and executive summaries. A collaborative, adaptable mindset that thrives in a fast?paced, mission?driven environment requiring innovation and agility.

#Ll-Hybrid #Ll-CC1 Learn more about Fox Tech at https://tech.fox.com We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, gender identity, disability, protected veteran status, or any other characteristic protected by law. We will consider for employment qualified applicants with criminal histories consistent with applicable law. Pursuant to state and local pay disclosure requirements, the pay rate/range for this role is $128,000.00?170,000.00 annually, with final offer amount dependent on education, skills, experience, and location. This role is eligible for an annual discretionary bonus and benefits including medical/dental/vision, 401(k), paid time off, and other benefits in accordance with plan documents. Benefits for union?represented employees will be in accordance with the applicable collective bargaining agreement. View more detail about FOX Benefits. #J-18808-Ljbffr