Security Engineer Intern, IR Threat Intelligence

Meta, City of Westminster

Security Engineer Intern, IR Threat Intelligence

Salary not available. View on company website.

Meta, City of Westminster

  • Full time
  • U
  • Onsite working
  • Graduate programme

Posted 2 days ago, 2 Nov | Get your application in today.

Closing date: Closing date not specified

job Ref: 9d84f8ce045c486cb54aae125801f88d

Full Job Description

Meta Security is looking for a Security Engineer with experience in threat modeling, TTP identification, and detection engineering. You'll work alongside Security Analysts, Software Engineers and Offensive Security Engineers to identify critical assets, assess the top risks, and evaluate and detect potential internal and external attacks against Meta systems. You will be working across engineering teams supporting Production and Corporate systems to develop detection and response automation leveraging both industry-standard and custom detection and response platforms. You'll generate detection ideas and implementations utilizing some of the world's largest datasets and build on top of hyper-scale data pipelines., 1. Work in cross-functional projects to improve our capabilities to effectively detect and respond to security incidents
2. Review security architecture of large-scale custom and commercial systems and independently propose logging, detection and prevention controls
3. Perform TTP-based Threat Modeling for a wide variety of assets including endpoints, mobile, servers, internal services, public & private cloud environments and networking equipment
4. Perform analysis against logs from a variety of sources (e.g., individual host logs, network traffic logs) to identify potential threats and detection ideas
5. Build response workflows and actions that auto-resolve false positives and provide context scaling our ability to investigate
6. Support security incident response in a cross-functional environment and drive incident resolution for internal and external threats
7. Design and implement attack testing automation to validate detection coverage
8. Build logging pipelines using our custom datasets and infrastructure
9. Track threat clusters posing threats to Meta's infrastructure and employees
10. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems and various intelligence feeds

11. Currently enrolled in a full-time, degree-seeking program and in the process of obtaining a Bachelors or Masters degree in computer science or a related field
12. Experience analyzing network and host-based security events
13. Knowledge of networking technologies, specifically TCP/IP and the related protocols
14. Knowledge of operating systems, file systems, and memory structures on Windows, MacOS and Linux
15. Coding/scripting experience in one or more general purpose languages
16. Experience with attacker tactics, techniques, and procedures
17. Must obtain work authorization in country of employment at the time of hire, and maintain ongoing work authorization during employment

Preferred Qualifications:

Preferred Qualifications:
18. Intent to return to full-time degree program after completion of the internship
19. Experience in Detection & Response Engineering or similar Security Engineering role
20. Experience designing systems used for responding to external and/or insider threats
21. Experience building automations and integrations using SOAR platforms
22. Background in security-focused software engineering, designing large scale systems and data pipelines, or offensive security
23. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems
24. Experience with anomaly detection applicable to the insider threat detection space
25. Familiarity with campaign tracking techniques and skills to convert the tracking results to long term countermeasures
26. Familiarity with threat modeling framework, such as Diamond Model and/or MITRE ATT&CK framework
27. Experience with intelligence-driven threat hunting to spot suspicious activities and identify potential risks, and experience with building notebooks to automate such hunts
28. Broad knowledge across the Security domain, as well as deep focus in one (or more) areas such as Logs and events processing, Incident Management, Digital Forensics, Offensive Security Testing, Detection and/or Response tooling development

Relevant jobs