Perform administrative and support duties for the SIEM platform, providing critical services for the protection and defense of Autodesk
Maintain and improve logging and detection roadmaps for continuous innovation
Provide expert recommendations to enhance data onboarding and ingestion normalization
Conduct detection engineering to meet intelligence requirements for advanced threats
Foster a transparent and collaborative team culture, emphasizing listening and recognition of team members at all levels
Research, document, and develop threat detections based on behavioral attributes of actors, malware operators, and general threats to Autodesk interests
Requirements
mitre
splunk
python
siem
security+
threat hunting
Knowledge of security frameworks such as MITRE ATT&CK and NIST
Certified Splunk Power User, either Splunk Enterprise Security or Splunk Cloud Admin, and/or Datadog's Log Management Fundamentals
Excellent written and verbal communication skills in English
Strong proficiency in logging and threat data engineering and analysis
Education: BA/BS in computer science, information security, or a related field, or equivalent experience
1-3 years of experience developing and maintaining security application integrations through APIs in Python or an equivalent scripting language
5+ years of experience in threat hunting, incident response, security engineering, SIEM engineering, or detection engineering roles
1-3 years of experience in threat detection engineering and/or threat hunting, focusing on implementing and sustaining structured hunt operations
Hands-on experience in applying unified data models to log/data sources (e.g. AWS, Azure, AD, DNS, proxy, FW, EDR, webservers) to support detection engineering
Passion for security automation and a solid understanding of security incident response