At a Glance
- Tasks: Investigate cyber threats and develop countermeasures to protect Meta's infrastructure.
- Company: Join Meta, a leader in connecting people through innovative technology.
- Benefits: Competitive salary, inclusive culture, and opportunities for professional growth.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technologies.
- Qualifications: 5+ years in threat intelligence and strong analytical skills required.
- Other info: Collaborative environment with a focus on career development and innovation.
The predicted salary is between 36000 - 60000 £ per year.
Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture.
Responsibilities
- Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network.
- Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences.
- Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations.
- Improve the tooling of threat cluster tracking and intelligence data integration to existing systems.
- Engage constructively in cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions.
Minimum Qualifications
- 5+ years threat intelligence experience.
- Bachelor's degree or equivalent experience in Security.
- Familiarity with campaign tracking techniques and converting the tracking results to long term countermeasures.
- Familiarity with threat modeling framework, such as Diamond Model or/and MITRE ATT&CK framework.
- Experience with intelligence-driven hunting to spot suspicious activities in the network and identify potential risks.
- Proven track record of managing and executing on short term and long term projects.
- Ability to work with a team spanning multiple locations/time zones.
- Ability to prioritize and execute tasks with minimal direction or oversight.
- Ability to think critically and qualify assessments with solid communications skills.
- Coding or scripting experience in one or more scripting languages such as Python or PHP.
Preferred Qualifications
- Experience close collaborating with incident responders on incident investigations.
- Familiarity with malware analysis or network traffic analysis.
- Familiarity with nation-state, sophisticated criminal, or supply chain threats.
- Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort.
- Experience in one or more query languages such as SQL.
- Experience authoring production code for threat intelligence tooling.
- Experience conducting large scale data analysis.
- Experience working across the broader security community.
Detection & Response Security Engineer, Threat Intelligence in London employer: Meta
Contact Detail:
Meta Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Detection & Response Security Engineer, Threat Intelligence in London
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, especially those already at Meta. A friendly chat can open doors and give you insider info on what they're really looking for.
✨Tip Number 2
Show off your skills! If you've got experience with threat modelling or coding, be ready to discuss specific projects. Bring examples that highlight your problem-solving abilities and how you’ve tackled real-world threats.
✨Tip Number 3
Prepare for the interview by brushing up on current cyber threats and trends. Being able to discuss recent incidents or emerging threats shows you're not just knowledgeable but also passionate about the field.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen. Plus, it shows you’re serious about joining the Meta team and contributing to our mission.
We think you need these skills to ace Detection & Response Security Engineer, Threat Intelligence in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the role of Detection & Response Security Engineer. Highlight your experience in threat intelligence and any relevant projects you've worked on. We want to see how your skills align with what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about threat intelligence and how your background makes you a great fit for Meta. Be sure to mention specific experiences that relate to the job description.
Showcase Your Technical Skills: Don’t forget to highlight your technical skills, especially in coding or scripting languages like Python or PHP. If you have experience with threat modelling frameworks or intelligence-driven hunting, make sure to include that too. We love seeing those skills in action!
Apply Through Our Website: We encourage you to apply through our website for the best chance of getting noticed. It’s super easy, and you’ll be able to submit all your materials in one go. Plus, it helps us keep track of your application!
How to prepare for a job interview at Meta
✨Know Your Threats
Before the interview, dive deep into the latest cyber threats and trends. Familiarise yourself with the specific threats that Meta faces and be ready to discuss how your experience aligns with tackling those challenges.
✨Showcase Your Intelligence Skills
Prepare to discuss your experience with threat intelligence frameworks like MITRE ATT&CK or the Diamond Model. Be ready to share examples of how you've used these frameworks in past roles to identify and mitigate risks.
✨Communicate Clearly
Since you'll be working with cross-functional teams, practice explaining complex security concepts in simple terms. Think of examples where you successfully communicated actionable intelligence to non-technical stakeholders.
✨Demonstrate Your Technical Know-How
Brush up on your coding or scripting skills, especially in Python or PHP. Be prepared to discuss any relevant projects where you developed tools for threat intelligence or conducted large-scale data analysis.