- Conduct security investigations and lead security incident response in a cross-functional environment and drive incident resolution.
- Develop Incident Response initiatives that improve our capabilities to effectively respond and remediate security incidents.
- Refine operational metrics, key performance indicators, and service level objectives to measure Security Operations and Incident Response services.
- Influence and align the team’s vision and strategy. Collaboratively prioritize and deliver specific multi-year roadmaps and projects.
- Build, cultivate, and maintain positive relationships with internal customers to identify and facilitate solutions to increase the impact of the team's work.
- Partner with cross-functional teams to solve challenges related to a broad spectrum of detection and response initiatives.
- Collaborate with software and production engineering teams to develop scalable and flexible Incident Response and Investigative solutions.
- Focus on ruthlessly prioritizing, automating and scaling every aspect of our detection and response capabilities.
- Coach, mentor, support and care for the team in a way that enables long-term career development, happiness and success at scale.
- 10+ years of work experience in Security Incident Response and Detection & Response Engineering in a large, regulated organization.
- Be a technical and process subject matter expert regarding Security Operations and Incident Response services.
- Experience developing and delivering information on incident and program status for senior leadership.
- Experience leading and managing complex cross-functional programs.
- Experience responding to both external and insider threats.
- Experience analyzing network and host-based security events.
- Knowledge of networking technologies, specifically TCP/IP and the related protocols.
- Knowledge of operating systems, file systems, and memory structures on Windows, MacOS and Linux.
- Coding/scripting experience in one or more general purpose languages.
- Experience with attacker tactics, techniques, and procedures.
- Background in malware analysis, digital forensics, intrusion detection, and/or threat intelligence.
- Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigate suspicious behavior across networks and systems.
- Broad knowledge across the Security domain, as well as deep focus in one (or more) areas such as Logs and events processing, Incident Management, Digital Forensics, Detection and/or response tool development.
- Experience recruiting, building, and leading technical teams, including performance management.
Individual compensation is determined by skills, qualifications, experience, and location. Compensation details listed in this posting reflect the base hourly rate, monthly rate, or annual salary only, and do not include bonus, equity or sales incentives, if applicable. In addition to base compensation, Meta offers benefits. Learn more about benefits at Meta.