Five9 provides businesses reliable, scalable, and secure cloud contact center software designed to create exceptional customer experiences, increase agent productivity, and deliver tangible business results.
We are driven by a passion to transform contact centers into customer engagement centers of excellence. Since 2001, Five9 has led the cloud revolution in contact centers, helping organizations transition from legacy premise-based solutions to the cloud.
- Provide subject matter expertise in security threat analysis, hunting, detection and response across Five9’s Production and Corp IT environments
- Perform analysis, correlation of actionable security events and alerts, network traffic analysis using raw packet data, net flow, IDS/IPS, SIEM and/or any custom sensor output as it pertains to security threat intelligence, analytics and visibility
- Participate in the Security Incident Response Team (SIRT) activities, helping SIRT to detect, respond, contain, eradicate and recover from security incidents in a timely manner, within the Cloud Operations and Corporate IT environments
- Develop and maintain the incident response framework consisting of Incident Response Plans and Procedures in the form of run books, for the most relevant incident types
- Ability to investigate and understand threat campaign(s) techniques, lateral movements and indicators of compromise (IOCs).
- Interface with external entities including law enforcement organizations, intelligence community organizations and other government agencies as required.
- Willingness to be on call and work odd hours when required
- 5+ years of previous experience working in security operations, hunt teams, threat intelligence or incident response
- Public Cloud experience required
- Minimum 3 years of experience working with multiple security technologies including IDS/IPS, SIEM, Log Analysis (Windows, Linux, Web Servers, FIM, NextGen Firewalls, NextGen AV, WAFs, etc.), Network and User Behavior Analysis tools, and Network Packet Analyzers and Visibility tools
- 3+ years of experience leading cyber security incident resolution as an Incident Response Engineer or Analyst in an Enterprise environment
- Knowledge of the Incident Response lifecycle, working independently to investigate and effectively respond to cyber security incidents, working with Digital Forensics tools in an Enterprise environment
- Advanced Knowledge of the TCP / IP protocol suite, security architecture, securing and hardening Operating Systems, Networks, Databases and Applications Experience developing and maintaining operations playbooks, run books, and the IR plans
- Prior experience employing forensic tools and techniques for attack reconstruction, including forensic analysis and volatile data collection and analysis, will be an added advantage
- Thorough understanding of the threat and attack landscape, latest security trends, attack vectors, vulnerabilities, and how they are leveraged by malicious actors
- Security certifications like CISSP, GSEC, GCFA, GCIH, CHFI, SEC+. CEH etc. are highly desired
- Excellent verbal and written communication skills and ability to document and explain technical details and incident reports clearly and concisely
- Will participate in on call rotation
- B.S. degree in Computer Science or related field or equivalent combination of professional development training and experience
#LI-Remote
#LI-RN1
Five9 embraces diversity and is committed to building a team that represents a variety of backgrounds, perspectives, and skills. The more inclusive we are, the better we are. Five9 is an equal opportunity employer.
View our privacy policy here.
–
Our headquarters are located in the beautiful Bishop Ranch Business Park in San Ramon, CA.
More Information
- Salary Offer $127,348
- Address San Ramon, California
- Salary Offer $100.000 ~
- Experience Level Senior
- Total Years Experience 5-10