As part of our team youll work with highly skilled security professionals passionate about identifying assessing and mitigating security risks. This role is central to the controls that protect Apples customers data and brand. Youll have the opportunity to build security processes and technology with a truly global responsibilities include:- Evaluate and assess threats and vulnerabilities to inform risk decisions and security strategy.- Collaborate with cross-functional teams to strengthen Apples security posture across incident response and vulnerability management.- Lead and coordinate response activities in alignment with Apples Emergency Response Plan and Security Operations Center (SOC).- Develop and execute playbooks for common security issues.- Conduct research and post-incident analysis to refine response strategies.- Partner with outreach teams to deliver training and workshops on security response best practices.- Define clear criteria and protocols for security emergency response.
7 years of experience in Information Security with a focus on incident response security engineering or intrusion detection.
Deep understanding of threat modeling operational threat intelligence and common attack vectors and frameworks.
Strong knowledge of system and network hardening practices.
Exceptional analytical and investigative skills with hands-on experience in root cause analysis.
Experience applying AI/ML techniques to analyze CVEs and prioritize high-risk vulnerabilities.
In-depth knowledge of macOS Linux or Windows operating systems and distributed systems design.
Expertise in analyzing endpoint network and application logs at scale.
Scripting and/or software development experience.
Demonstrated ability to design document and implement new security processes
B.S. in Computer Science Engineering or equivalent technical fieldor equivalent practical experience.
Security certifications such as OSCP GIAC or CCNP/CCIE are a plus.
Experience with enterprise log collection and analysis platforms (e.g. Splunk OSQuery).
Strong grasp of core information security concepts and terminology.
Understanding of exploit development and conditions required to trigger different vulnerability types.
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.