The role involves monitoring, analyzing, and responding to security events and incidents within Celonis' cybersecurity team, focusing on improving detection and response capabilities to protect the company's systems and data.
Key Responsibilities
Monitor security events and potential security incidents using SIEM and other security tools
Respond to security events and incidents following company policies and procedures
Participate in all pre- and post-incident activities as outlined in the incident response plan
Assist in developing processes, procedures, and playbooks to improve detection and response capabilities
Build and test security defense procedures and IR playbooks
Create detection use cases and document incident information in case management systems
Conduct initial analysis of alerts from correlation tools and external sources
Monitor environment for compliance violations, anomalous behavior, and potential attacks
Participate in shift handovers and on-call rotations to ensure effective incident management
Requirements
The candidate must be part of the Celonis Global Cyber Defense Team (GCDT) covering the North America East Coast time zone.
The candidate must have experience monitoring security events and potential security incidents.
The candidate must respond to security events and incidents in accordance with Celonis policies and procedures.
The candidate must participate in all pre and post incident activities as outlined in the Celonis Information Security Incident Response Plan.
The candidate must assist in the development of processes and procedures to help improve detection and response capabilities.
The candidate must assist with building out Security Orchestration, Automation, and Response (SOAR) capabilities.
The candidate must create and test Celonis Defense Procedures and Incident Response (IR) Playbooks.
The candidate must create Detection Use Cases.
The candidate must document relevant incident information into the case management system, detailing the critical data for each incident to develop a historical record.
The candidate must monitor the environment, Security Information and Event Management (SIEM), and other internal security tools for compliance violations, anomalous behavior, and potential attacks.
The candidate must respond to possible threats to the organization based on monitoring activities.
The candidate must participate in shift turnover meetings between outgoing and incoming teams globally to pass along critical information and ensure effective transition of open cases.
The candidate must perform initial analysis of all new alerts generated by correlation alerting tools and other external sources feeding into the SIEM system and security monitoring tools.
The candidate must participate in on-call rotation.
The candidate must have familiarity with Application Security Attack Frameworks, Cloud Platform Security, Container Security, Database Security, Email Security, Endpoint Security, Incident Response Frameworks, Incident Response Activities, Network Security, and Social Engineering Techniques.
The candidate must have fundamental knowledge of Endpoint Detection and Response (EDR) Tooling, Log Analysis, and Security Information and Event Management (SIEM) Tooling.
Benefits & Perks
Base salary range: 134,000 - 180,000 USD (location-based, full-time)
Bonus, commission, and equity (RSUs)
Health, dental, and life insurance
401k retirement plan
Paid time off (PTO)
Generous PTO
Hybrid working options
Comprehensive benefits package
Extensive parental leave
Dedicated volunteer days
Gym subsidies
Counseling and well-being programs
Internal mobility and mentorship opportunities
Clear career paths and learning programs
Community and inclusion programs
Ready to Apply?
Join Celonis and make an impact in renewable energy