{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/mitre-att-and-ck"},"x-facet":{"type":"skill","slug":"mitre-att-and-ck","display":"MITRE ATT&CK","count":5},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_142655a8-403"},"title":"Red Team Security Engineer","description":"<p>Astranis is looking for a Red Team Security Engineer who thinks like an adversary and views security as an art form. Our ideal candidate thrives on the challenge of finding novel ways to bypass defenses and has a natural talent for uncovering hidden attack paths.</p>\n<p>Role: Actively devise and execute sophisticated, multi-stage attack campaigns that emulate the tactics, techniques, and procedures (TTPs) of relevant threat actors. Identify and exploit vulnerabilities across the organisation&#39;s digital and physical landscapes, including networks, applications, facilities, and personnel. Conduct covert red team operations, including network penetration testing, application security assessments, social engineering, and physical security breach simulations. Lead and participate in purple team exercises, working collaboratively with the blue team to analyse attack paths, test detection capabilities, and improve incident response playbooks in real-time. Assess the effectiveness of remediation efforts by re-testing identified vulnerabilities and attack paths after fixes have been implemented. Develop custom tooling and scripts to automate and enhance attack simulations. Create detailed post-engagement reports that clearly document findings, articulate business risk, and provide actionable recommendations for improving security posture. Act as the resident subject matter expert on offensive security and threat actor methodologies.</p>\n<p>Requirements: 3+ years of experience in an offensive security role (e.g., Red Teaming, Penetration Testing). Proven experience in planning and executing covert red team operations from reconnaissance to objective completion. A deep understanding of attacker TTPs and frameworks like MITRE ATT&amp;CK. Proficient in at least one scripting language, such as Python, for tooling and automation. Hands-on experience with common offensive security tools (e.g., Cobalt Strike, Metasploit, Burp Suite, custom implants). Strong analytical and problem-solving skills with a creative and unconventional mindset. Ability to work both independently and collaboratively in a team environment. Excellent written and oral communication skills, with the ability to articulate complex technical risks to both technical and non-technical audiences.</p>\n<p>Bonus: Any relevant certifications such as OSCP, OSCE, or OSEP. Experience with physical security assessments or social engineering campaigns. Previous experience building and running a red team program.</p>\n<p>What we offer: All our positions offer a compensation package that includes equity and robust benefits. Base pay is just one component of Astranis’s total rewards package. Your compensation also includes a significant equity package via incentive stock options, high-quality company-subsidized healthcare, disability and life insurance, 401(k) retirement planning, flexible PTO, and free on-site catered meals.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_142655a8-403","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Astranis","sameAs":"https://astranis.com/","logo":"https://logos.yubhub.co/astranis.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/astranis/jobs/4667338006?utm_source=yubhub.co&utm_medium=jobs_feed&utm_campaign=apply","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$130,000-$205,000 USD","x-skills-required":["offensive security","red teaming","penetration testing","MITRE ATT&CK","Python","Cobalt Strike","Metasploit","Burp Suite","custom implants"],"x-skills-preferred":[],"datePosted":"2026-04-24T15:21:23.323Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"offensive security, red teaming, penetration testing, MITRE ATT&CK, Python, Cobalt Strike, Metasploit, Burp Suite, custom implants","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":130000,"maxValue":205000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_81fdc88b-027"},"title":"Staff Detection & Response Engineer","description":"<p>Secure Every Identity, from AI to Human</p>\n<p>Identity is the key to unlocking the potential of AI. Okta secures AI by building the trusted, neutral infrastructure that enables organisations to safely embrace this new era. This work requires a relentless drive to solve complex challenges with real-world stakes. We are looking for builders and owners who operate with speed and urgency and execute with excellence.</p>\n<p>This is an opportunity to do career-defining work. We&#39;re all in on this mission. If you are too, let&#39;s talk.</p>\n<p><strong>About the Role</strong></p>\n<p>As a Staff Detection &amp; Response Engineer at Okta, you will occupy a high-impact leadership role within our Security Operations organisation. This is not just a technical role; it is a strategic one. You will influence security decisions across multiple teams, drive innovation in our defence-in-depth strategies, and act as a force multiplier for our global security posture.</p>\n<p>You will be responsible for leading complex threat hunts, managing major security incidents, and architecting the detection frameworks that protect Okta’s infrastructure and customers. You will serve as a bridge between executive leadership and technical teams, ensuring our security objectives align with broader business trends and strategic goals.</p>\n<p><strong>What You’ll Do</strong></p>\n<p>Technical Leadership &amp; Innovation</p>\n<ul>\n<li>Threat Hunting: Lead complex, hypothesis-driven threat hunts based on vague intelligence, and develop refined methodologies for the broader team to follow.</li>\n</ul>\n<ul>\n<li>Detection Engineering: Write novel detections and solve complex querying challenges. You will establish the frameworks and standards for detection engineering across the entire security organisation.</li>\n</ul>\n<ul>\n<li>Architectural Influence: Design and validate the effectiveness of preventative control chains and influence the selection and architecture of new security solutions.</li>\n</ul>\n<ul>\n<li>Incident Response: Serve as the technical lead for major incidents, including investigating threats in “foreign” or uncommon environments by leveraging frameworks and your professional network.</li>\n</ul>\n<p>Global Mindset: While Okta maintains a 24x7 posture, there is a requirement to be available in a crisis out of (your business) hours, and as a thought leader, to interface with colleagues globally.</p>\n<p>Strategic Execution</p>\n<ul>\n<li>Project Ownership: Own multi-quarter objectives and drive them to success, developing project plans that align with Okta’s strategic VMTs (Vision, Metrics, and Targets) and budget.</li>\n</ul>\n<ul>\n<li>Problem Solving: Navigate issues of diverse scope, analysing data against current business trends to provide innovative solutions.</li>\n</ul>\n<ul>\n<li>Innovation: Secure resources for and drive innovation initiatives across multiple teams, facilitating cross-functional workshops to generate new security solutions.</li>\n</ul>\n<p>Team Advocacy &amp; Mentorship</p>\n<ul>\n<li>Culture Building: Foster an inclusive, collaborative environment by sharing wins, rewarding team efforts, and encouraging diverse perspectives.</li>\n</ul>\n<ul>\n<li>Mentorship: Act as an advisor to junior colleagues, providing actionable feedback and helping others align their career goals with organisational objectives.</li>\n</ul>\n<ul>\n<li>Consensus Driving: Drive consensus and resolve issues within cross-functional teams, ensuring all stakeholders are aligned on security priorities.</li>\n</ul>\n<p><strong>Who You Are</strong></p>\n<ul>\n<li>Expert Investigator: You have a deep understanding of threat actor TTPs and can navigate complex systems even when documentation is sparse.</li>\n</ul>\n<ul>\n<li>Effective Communicator: You can translate complex technical problems for any audience, from executive leadership to junior analysts.</li>\n</ul>\n<ul>\n<li>Resilient Leader: You have a “bottom-line” orientation, persisting through obstacles and setbacks to achieve results.</li>\n</ul>\n<ul>\n<li>Self-Aware &amp; Empathetic: You proactively seek feedback, know your limits, and lead with empathy and compassion.</li>\n</ul>\n<ul>\n<li>Collaboratively Minded: You prioritise the development of others and establish internal and external networks of coaches and mentors.</li>\n</ul>\n<p><strong>Qualifications</strong></p>\n<ul>\n<li>Proven experience in a high-growth SaaS or security-focused environment.</li>\n</ul>\n<ul>\n<li>Expertise in querying languages, detection frameworks (e.g., MITRE ATT&amp;CK), and modern IR toolsets.</li>\n</ul>\n<ul>\n<li>Experience managing communications during crises or major security incidents.</li>\n</ul>\n<ul>\n<li>Demonstrated ability to lead project teams and manage budget/resource requirements.</li>\n</ul>\n<ul>\n<li>Strong background in automating response workflows and refining preventative controls.</li>\n</ul>\n<p>Why Okta? Okta is the World’s Identity Company. We are building a world where anyone can safely use any technology. As a Staff Engineer, you will play a pivotal role in ensuring that vision remains a reality.</p>\n<p>#LI-HYBRID</p>\n<p>P6513_3323862</p>\n<p>Below is the annual salary range for candidates located in Canada. Your actual salary will depend on factors such as your skills, qualifications, and experience. In addition, Okta offers equity (where applicable), bonus, and benefits, including health, dental, and vision insurance, RRSP with a match, healthcare spending, telemedicine, and paid leave (including PTO and parental leave) in accordance with our applicable plans and policies. To learn more about our Total Rewards program, please visit: https://rewards.okta.com/can.</p>\n<p>The annual base salary range for this position for candidates located in Canada is between:</p>\n<p>$141,000-$193,000 CAD</p>\n<p>The Okta Experience</p>\n<ul>\n<li>Supporting Your Well-Being</li>\n</ul>\n<ul>\n<li>Driving Social Impact</li>\n</ul>\n<ul>\n<li>Developing Talent and Fostering Connection + Community</li>\n</ul>\n<p>We are intentional about connection. Our global community, spanning over 20 offices worldwide, is united by a drive to innovate. Your journey begins with an immersive, in-person onboarding experience designed to accelerate your impact and connect you to our mission and team from day one.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_81fdc88b-027","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Okta","sameAs":"https://www.okta.com/","logo":"https://logos.yubhub.co/okta.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/okta/jobs/7833771?utm_source=yubhub.co&utm_medium=jobs_feed&utm_campaign=apply","x-work-arrangement":"hybrid","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":"$141,000-$193,000 CAD","x-skills-required":["querying languages","detection frameworks","MITRE ATT&CK","modern IR toolsets","project management","budget/resource management","automating response workflows","refining preventative controls"],"x-skills-preferred":[],"datePosted":"2026-04-24T12:20:56.094Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Vancouver, Canada"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"querying languages, detection frameworks, MITRE ATT&CK, modern IR toolsets, project management, budget/resource management, automating response workflows, refining preventative controls","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":141000,"maxValue":193000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_3f48b4f4-789"},"title":"Manager, Detection & Incident Response","description":"<p>We&#39;re seeking a skilled and detail-oriented technical leader to own the day-to-day operations of our Detection and Incident Response team. You&#39;ll be responsible for driving our SIEM and SOAR capabilities and incident response program, partnering with teams throughout Squarespace to improve how we spot and respond to threats.</p>\n<p>Key responsibilities include:</p>\n<ul>\n<li>Contributing to define, collect, and analyze security KPIs and KRIs for the security organization.</li>\n<li>Developing and implementing a comprehensive detection and response strategy and roadmap aligned with Squarespace&#39;s overall business objectives and risk appetite.</li>\n<li>Overseeing the Security Operations Center (SOC) activities, including threat detection, monitoring, analysis, and proactive hunting.</li>\n<li>Owning the health and effectiveness of the SIEM and SOAR platforms, ensuring high-quality data ingestion, alert tuning, and automated response logic.</li>\n<li>Establishing and maintaining a robust incident response program, including defining incident playbooks, leading major incident investigations, and conducting post-incident reviews to drive continuous improvement.</li>\n<li>Designing and leading regular tabletop exercises to test the organization&#39;s readiness for various incident scenarios.</li>\n<li>Serving as the Incident Commander for major security events, coordinating with teams such as Legal, Communications, and HR to ensure clear internal communication and regulatory compliance.</li>\n<li>Identifying, evaluating, and implementing new security technologies and tools to enhance detection, prevention, and response capabilities.</li>\n<li>Driving continuous improvement of security operations processes through automation, tooling, and best practices.</li>\n<li>Staying abreast of emerging security threats, vulnerabilities, and industry trends and proactively advising leadership on necessary adjustments to strengthen Squarespace&#39;s security posture.</li>\n<li>Building, mentoring, and leading a high-performing team of security professionals, fostering a culture of continuous learning, collaboration, and accountability.</li>\n<li>Acting as a key liaison and trusted advisor to internal stakeholders on security-related matters.</li>\n<li>Managing relationships with external security vendors and partners, ensuring effective service delivery and technology adoption.</li>\n</ul>\n<p>Requirements include:</p>\n<ul>\n<li>A bachelor&#39;s degree in Computer Science, Information Security, or a related field (or equivalent experience).</li>\n<li>7+ years of experience in cybersecurity, with at least 2 years in a leadership or team-lead role.</li>\n<li>Deep expertise in Incident Response and Detection Engineering.</li>\n<li>Strong knowledge of cloud security operations, specifically within AWS or GCP environments.</li>\n<li>Hands-on experience managing and tuning SIEM and SOAR platforms.</li>\n<li>Experience automating security workflows and incident response playbooks to reduce manual effort.</li>\n<li>Familiarity with security frameworks such as MITRE ATT&amp;CK and NIST.</li>\n<li>Excellent communication skills with the ability to lead technical teams during high-pressure incidents and explain complex threats to non-technical stakeholders.</li>\n<li>Knowledge of software development, design, and technical operations.</li>\n</ul>\n<p>Benefits include:</p>\n<ul>\n<li>Health insurance with 100% covered premiums for you, your spouse or partner, and your dependent children.</li>\n<li>Life and income protection.</li>\n<li>Fertility and adoption benefits.</li>\n<li>Headspace mindfulness app subscription.</li>\n<li>Global Employee Assistance Program.</li>\n<li>Pension benefits with employer match.</li>\n<li>Flexible paid time off.</li>\n<li>26 weeks paid maternity leave and 12 weeks paid paternity leave.</li>\n<li>2 weeks paid family care leave.</li>\n<li>Education reimbursement.</li>\n<li>Employee donation match to community organizations.</li>\n<li>7 Global Employee Resource Groups (ERGs).</li>\n<li>Free lunch and snacks.</li>\n<li>Close proximity to cultural landmarks such as Dublin Castle and St. Patrick&#39;s Cathedral.</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_3f48b4f4-789","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Squarespace","sameAs":"https://www.squarespace.com/about/careers","logo":"https://logos.yubhub.co/squarespace.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/squarespace/jobs/7773251?utm_source=yubhub.co&utm_medium=jobs_feed&utm_campaign=apply","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["SIEM","SOAR","Incident Response","Cloud Security Operations","AWS","GCP","Security Frameworks","MITRE ATT&CK","NIST","Software Development","Design","Technical Operations"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:55:55.055Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Dublin"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"SIEM, SOAR, Incident Response, Cloud Security Operations, AWS, GCP, Security Frameworks, MITRE ATT&CK, NIST, Software Development, Design, Technical Operations"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_de3eafc7-e74"},"title":"Cloudforce One REACT Principal Consultant","description":"<p>About Us</p>\n<p>At Cloudflare, we are on a mission to help build a better Internet. We run one of the world&#39;s largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies.</p>\n<p>Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks.</p>\n<p>About the Team</p>\n<p>Cloudforce One is Cloudflare&#39;s threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state advanced persistent threats (APTs).</p>\n<p>About the Role</p>\n<p>We are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence-driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors.</p>\n<p>Responsibilities</p>\n<p>As a REACT Consultant, you will respond to customer security incidents in on-premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity.</p>\n<p>The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base.</p>\n<p>Requirements</p>\n<p>Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands-on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX-based platforms.</p>\n<p>You will be responsible correlating threat actor activity across the customers environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang.</p>\n<p>Examples of desirable skills, knowledge and experience include:</p>\n<ul>\n<li>Bachelor&#39;s degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience</li>\n<li>3+ years of previous experience in cyber security</li>\n<li>2+ years of Incident Response experience</li>\n<li>1+ years of customer-facing role</li>\n<li>Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists</li>\n<li>Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise</li>\n<li>Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs</li>\n<li>Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis</li>\n<li>Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations</li>\n<li>Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations</li>\n<li>Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies</li>\n<li>Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams</li>\n<li>Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups</li>\n<li>Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS</li>\n<li>Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare)</li>\n<li>Understanding of MITRE ATT&amp;CK and NIST Cyber Security Frameworks standards and requirements</li>\n<li>In-depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems</li>\n</ul>\n<p>Bonus Points:</p>\n<ul>\n<li>Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system</li>\n<li>Proficient with Yara and writing rules to detect similar malware samples</li>\n<li>Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs</li>\n<li>Practical malware analysis experience with static, dynamic, and automated malware analysis techniques</li>\n<li>Possess mid-level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples</li>\n<li>Reverse engineering experience with APT malware with an understanding of common infection vectors</li>\n<li>Knowledgeable of current malware techniques to evade detection and obstruct analysis</li>\n<li>Experience writing malware reports on unique and interesting aspects of malware</li>\n<li>Experience with malware attribution</li>\n<li>Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration</li>\n<li>Familiarity with bash command line executables to conduct static analysis and investigate IOCs</li>\n</ul>\n<p>Travel requirements</p>\n<p>Ability to travel up to 20% of the time</p>\n<p>Position may require foreign and domestic travel, passport will be required</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_de3eafc7-e74","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Cloudflare","sameAs":"https://www.cloudflare.com/","logo":"https://logos.yubhub.co/cloudflare.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/cloudflare/jobs/7389902?utm_source=yubhub.co&utm_medium=jobs_feed&utm_campaign=apply","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Digital Forensics","Incident Response","Cybersecurity","Network Forensic Analysis","Reverse Engineering","Malware Analysis","Cloud Incident Response","Communication","Network Protocols","Cloud Environments","MITRE ATT&CK","NIST Cyber Security Frameworks","Windows Operating Systems","Unix","Linux","Mac Operating Systems"],"x-skills-preferred":["Python","Golang","Yara","Source Code","Hex","Binary","Regular Expression","Data Correlation","Network Flow","System Logs","Static Analysis","Dynamic Analysis","Automated Malware Analysis","Malware Attribution","Indicator of Compromise","Infrastructure Enumeration","Bash Command Line Executables"],"datePosted":"2026-04-18T15:52:02.967Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Hybrid"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Digital Forensics, Incident Response, Cybersecurity, Network Forensic Analysis, Reverse Engineering, Malware Analysis, Cloud Incident Response, Communication, Network Protocols, Cloud Environments, MITRE ATT&CK, NIST Cyber Security Frameworks, Windows Operating Systems, Unix, Linux, Mac Operating Systems, Python, Golang, Yara, Source Code, Hex, Binary, Regular Expression, Data Correlation, Network Flow, System Logs, Static Analysis, Dynamic Analysis, Automated Malware Analysis, Malware Attribution, Indicator of Compromise, Infrastructure Enumeration, Bash Command Line Executables"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_f2139aac-53b"},"title":"Staff Detection & Response Engineer","description":"<p>Secure Every Identity, from AI to Human</p>\n<p>Identity is the key to unlocking the potential of AI. Okta secures AI by building the trusted, neutral infrastructure that enables organisations to safely embrace this new era. This work requires a relentless drive to solve complex challenges with real-world stakes. We are looking for builders and owners who operate with speed and urgency and execute with excellence.</p>\n<p>This is an opportunity to do career-defining work. We&#39;re all in on this mission. If you are too, let&#39;s talk.</p>\n<p><strong>About the Role</strong></p>\n<p>As a Staff Detection &amp; Response Engineer at Okta, you will occupy a high-impact leadership role within our Security Operations organisation. This is not just a technical role; it is a strategic one. You will influence security decisions across multiple teams, drive innovation in our defence-in-depth strategies, and act as a force multiplier for our global security posture.</p>\n<p>You will be responsible for leading complex threat hunts, managing major security incidents, and architecting the detection frameworks that protect Okta’s infrastructure and customers. You will serve as a bridge between executive leadership and technical teams, ensuring our security objectives align with broader business trends and strategic goals.</p>\n<p><strong>What You’ll Do</strong></p>\n<p><strong>Technical Leadership &amp; Innovation</strong></p>\n<ul>\n<li>Threat Hunting: Lead complex, hypothesis-driven threat hunts based on vague intelligence, and develop refined methodologies for the broader team to follow.</li>\n</ul>\n<ul>\n<li>Detection Engineering: Write novel detections and solve complex querying challenges. You will establish the frameworks and standards for detection engineering across the entire security organisation.</li>\n</ul>\n<ul>\n<li>Architectural Influence: Design and validate the effectiveness of preventative control chains and influence the selection and architecture of new security solutions.</li>\n</ul>\n<ul>\n<li>Incident Response: Serve as the technical lead for major incidents, including investigating threats in &#39;foreign&#39; or uncommon environments by leveraging frameworks and your professional network.</li>\n</ul>\n<p><strong>Global Mindset</strong></p>\n<p>While Okta maintains a 24x7 posture, there is a requirement to be available in a crisis out of (your business) hours, and as a thought leader, to interface with colleagues globally.</p>\n<p><strong>Strategic Execution</strong></p>\n<ul>\n<li>Project Ownership: Own multi-quarter objectives and drive them to success, developing project plans that align with Okta’s strategic VMTs (Vision, Metrics, and Targets) and budget.</li>\n</ul>\n<ul>\n<li>Problem Solving: Navigate issues of diverse scope, analysing data against current business trends to provide innovative solutions.</li>\n</ul>\n<ul>\n<li>Innovation: Secure resources for and drive innovation initiatives across multiple teams, facilitating cross-functional workshops to generate new security solutions.</li>\n</ul>\n<p><strong>Team Advocacy &amp; Mentorship</strong></p>\n<ul>\n<li>Culture Building: Foster an inclusive, collaborative environment by sharing wins, rewarding team efforts, and encouraging diverse perspectives.</li>\n</ul>\n<ul>\n<li>Mentorship: Act as an advisor to junior colleagues, providing actionable feedback and helping others align their career goals with organisational objectives.</li>\n</ul>\n<ul>\n<li>Consensus Driving: Drive consensus and resolve issues within cross-functional teams, ensuring all stakeholders are aligned on security priorities.</li>\n</ul>\n<p><strong>Who You Are</strong></p>\n<ul>\n<li>Expert Investigator: You have a deep understanding of threat actor TTPs and can navigate complex systems even when documentation is sparse.</li>\n</ul>\n<ul>\n<li>Effective Communicator: You can translate complex technical problems for any audience, from executive leadership to junior analysts.</li>\n</ul>\n<ul>\n<li>Resilient Leader: You have a &#39;bottom-line&#39; orientation, persisting through obstacles and setbacks to achieve results.</li>\n</ul>\n<ul>\n<li>Self-Aware &amp; Empathetic: You proactively seek feedback, know your limits, and lead with empathy and compassion.</li>\n</ul>\n<ul>\n<li>Collaboratively Minded: You prioritise the development of others and establish internal and external networks of coaches and mentors.</li>\n</ul>\n<p><strong>Qualifications</strong></p>\n<ul>\n<li>Proven experience in a high-growth SaaS or security-focused environment.</li>\n</ul>\n<ul>\n<li>Expertise in querying languages, detection frameworks (e.g., MITRE ATT&amp;CK), and modern IR toolsets.</li>\n</ul>\n<ul>\n<li>Experience managing communications during crises or major security incidents.</li>\n</ul>\n<ul>\n<li>Demonstrated ability to lead project teams and manage budget/resource requirements.</li>\n</ul>\n<ul>\n<li>Strong background in automating response workflows and refining preventative controls.</li>\n</ul>\n<p><strong>Why Okta?</strong></p>\n<p>Okta is the World’s Identity Company. We are building a world where anyone can safely use any technology. As a Staff Engineer, you will play a pivotal role in ensuring that vision remains a reality.</p>\n<p>#LI-HYBRID</p>\n<p>P6513_3323862</p>\n<p>Below is the annual salary range for candidates located in Canada. Your actual salary will depend on factors such as your skills, qualifications, and experience. In addition, Okta offers equity (where applicable), bonus, and benefits, including health, dental, and vision insurance, RRSP with a match, healthcare spending, telemedicine, and paid leave (including PTO and parental leave) in accordance with our applicable plans and policies. To learn more about our Total Rewards program, please visit: https://rewards.okta.com/can.</p>\n<p>The annual base salary range for this position for candidates located in Canada is between: $141,000-$211,000 CAD</p>\n<p>The Okta Experience</p>\n<ul>\n<li>Supporting Your Well-Being</li>\n</ul>\n<ul>\n<li>Driving Social Impact</li>\n</ul>\n<ul>\n<li>Developing Talent and Fostering Connection + Community</li>\n</ul>\n<p>We are intentional about connection. Our global community, spanning over 20 offices worldwide, is united by a drive to innovate. Your journey begins with an immersive, in-person onboarding experience designed to accelerate your impact and connect you to our mission and team from day one.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_f2139aac-53b","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Okta","sameAs":"https://www.okta.com/","logo":"https://logos.yubhub.co/okta.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/okta/jobs/7492429?utm_source=yubhub.co&utm_medium=jobs_feed&utm_campaign=apply","x-work-arrangement":"hybrid","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":"$141,000-$211,000 CAD","x-skills-required":["querying languages","detection frameworks","MITRE ATT&CK","modern IR toolsets","project management","budget/resource management","automating response workflows","refining preventative controls"],"x-skills-preferred":[],"datePosted":"2026-04-18T15:47:27.453Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Toronto, Ontario, Canada"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"querying languages, detection frameworks, MITRE ATT&CK, modern IR toolsets, project management, budget/resource management, automating response workflows, refining preventative controls","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":141000,"maxValue":211000,"unitText":"YEAR"}}}]}