{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/siems"},"x-facet":{"type":"skill","slug":"siems","display":"Siems","count":2},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_10ab61a1-14e"},"title":"Cyber Security Engineering, Sr Engineer","description":"<p>At Synopsys, we drive the innovations that shape the way we live and connect. Our technology is central to the Era of Pervasive Intelligence, from self-driving cars to learning machines. We lead in chip design, verification, and IP integration, empowering the creation of high-performance silicon chips and software content.</p>\n<p>You are a passionate and experienced cybersecurity professional with a keen eye for detail and a deep understanding of threat detection and mitigation. You thrive in fast-paced, collaborative environments and are energized by the challenge of staying ahead of evolving cyber threats. Your technical expertise spans across log aggregation platforms like Elastic, scripting languages such as Python, and enterprise SIEMs. You have a strong grasp of threat actor techniques, vulnerabilities, and exploits, and you leverage frameworks like Mitre ATT&amp;CK to inform your detection strategies.</p>\n<p>You are committed to continuous learning, regularly updating your knowledge to remain at the forefront of cybersecurity advancements. Your analytical mindset enables you to dissect complex security incidents and identify patterns that others might miss. You value clear documentation and process consistency, ensuring that your work can be easily understood and replicated by your peers.</p>\n<p>You are a natural communicator, able to articulate security concepts to both technical and non-technical stakeholders. Your collaborative spirit drives cross-functional engagement, enhancing the organization’s security posture. With a high tolerance for autonomy, you are comfortable taking initiative and leading projects to completion. Certifications such as CISSP, GCIH, GCFE, GCFA, or GMON are a testament to your dedication, but your practical experience is what truly sets you apart.</p>\n<p>You will be responsible for building detection logics using log aggregation platforms like Elastic in large enterprise environments, maintaining and improving existing detection tools and systems to ensure optimal performance and reliability, creating and maintaining documentation for detection processes and procedures to ensure clarity and consistency, utilizing your knowledge of threat actor techniques, vulnerabilities, and exploits to identify and help mitigate potential security risks, collaborating with cross-functional teams to enhance overall security posture and response strategies, staying up-to-date with the latest advancements in cybersecurity to continuously improve detection capabilities.</p>\n<p>By joining our team, you will enhance the security posture of Synopsys by identifying and mitigating potential threats, contribute to the development and maintenance of robust detection tools and systems, improve the efficiency and effectiveness of security operations through automation and scripting, provide valuable insights and recommendations to enhance overall security strategies, support the continuous improvement of detection processes and procedures, and elevate the organization&#39;s resilience and readiness against emerging cyber threats.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_10ab61a1-14e","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Synopsys","sameAs":"https://careers.synopsys.com","logo":"https://logos.yubhub.co/careers.synopsys.com.png"},"x-apply-url":"https://careers.synopsys.com/job/austin/cyber-security-engineering-sr-engineer-16007/44408/92616533008","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$101000-$152000","x-skills-required":["ci/cd methodology","elastic","python","enterprise siems","mitre att&ck framework","threat detection","incident response","security operations"],"x-skills-preferred":[],"datePosted":"2026-04-05T13:22:41.630Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Austin"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"ci/cd methodology, elastic, python, enterprise siems, mitre att&ck framework, threat detection, incident response, security operations","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":101000,"maxValue":152000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_7732e8ed-b24"},"title":"Cyber Security Engineer","description":"<p><strong>Job Description</strong></p>\n<p>You are a forward-thinking cybersecurity professional with a passion for defending critical infrastructure and sensitive data. As a Cyber Security Engineer at Synopsys, you will be responsible for configuring, implementing, and maintaining host-based firewalls, intrusion prevention systems (IPS), anti-virus software, SELinux, network firewalls, SIEMs, and proxies across diverse environments.</p>\n<p><strong>Key Responsibilities</strong></p>\n<ul>\n<li>Configuring, implementing, and maintaining host-based firewalls, intrusion prevention systems (IPS), anti-virus software, SELinux, network firewalls, SIEMs, and proxies across diverse environments.</li>\n<li>Developing, updating, and documenting Standard Operating Procedures (SOPs) for security tools and maintaining accurate network diagrams.</li>\n<li>Creating and deploying host and network countermeasures based on open source intelligence (OSINT), behavioral analysis, and evolving threat landscapes.</li>\n<li>Monitoring, tuning, and implementing security controls in tools such as McAfee ePO and Palo Alto to ensure optimal protection.</li>\n<li>Managing and troubleshooting Security Information and Event Management (SIEM) feeds, ensuring timely detection and response to security events.</li>\n<li>Designing and implementing custom QRadar dashboards to visualize and analyze critical security datasets.</li>\n<li>Leading incident response efforts, ensuring chain of custody is maintained and investigations are thoroughly documented.</li>\n<li>Characterizing and analyzing network and host traffic to identify anomalous activity and mitigate potential threats.</li>\n<li>Developing and deploying custom Data Loss Prevention (DLP) signatures within Microsoft O365, Palo Alto, and McAfee environments.</li>\n</ul>\n<p><strong>Impact</strong></p>\n<ul>\n<li>Strengthening the security posture of Ansys Government Initiatives (AGI) by proactively defending against emerging threats.</li>\n<li>Ensuring compliance with rigorous federal and organizational security standards, supporting government and commercial initiatives.</li>\n<li>Reducing risk of data breaches and operational disruptions through robust countermeasure development and incident response.</li>\n<li>Enhancing operational readiness by keeping security documentation, SOPs, and network diagrams current and actionable.</li>\n<li>Empowering internal teams and stakeholders by providing clear security guidance, training, and technical leadership.</li>\n<li>Contributing to a culture of continuous improvement, innovation, and collaboration within the security team and broader organization.</li>\n</ul>\n<p><strong>Requirements</strong></p>\n<ul>\n<li>Minimum two (2) years performing system administrator duties for Windows and/or Linux environments.</li>\n<li>This position requires a government security clearance. You must be a U.S. citizen for consideration.</li>\n<li>SEC+ or equivalent industry-recognized certification.</li>\n<li>At least two (2) years of experience in an Enterprise Security Operation Center (SOC) or similar response team.</li>\n<li>Minimum two (2) years supporting the Federal Government—either directly or as a contractor—in a security-related field.</li>\n<li>Strong technical understanding of current hardware and software technologies, including security tools and platforms.</li>\n</ul>\n<p><strong>Who You Are</strong></p>\n<ul>\n<li>Analytical thinker with excellent problem-solving and decision-making skills.</li>\n<li>Organized, self-motivated, and able to prioritize competing requests in a dynamic environment.</li>\n<li>Exceptional communicator, able to translate complex technical concepts for diverse audiences and present information to groups.</li>\n<li>Collaborative team player, eager to support and learn from colleagues while driving collective success.</li>\n<li>Customer-focused, with strong relationship management skills and a commitment to user education and support.</li>\n<li>Adaptable and resilient, ready to respond to urgent issues and evolving security challenges.</li>\n</ul>\n<p><strong>The Team You’ll Be A Part Of</strong></p>\n<p>You’ll join the Ansys Government Initiatives (AGI) Cybersecurity team, a specialized group dedicated to protecting sensitive government and commercial assets. The team collaborates closely with internal stakeholders, federal partners, and industry experts to safeguard critical infrastructure and ensure compliance with the highest security standards. Together, you’ll drive innovation, share knowledge, and foster a culture of trust and resilience.</p>\n<p><strong>Rewards and Benefits</strong></p>\n<p>We offer a comprehensive range of health, wellness, and financial benefits to cater to your needs. Our total rewards include both monetary and non-monetary offerings. Your recruiter will provide more details about the salary range and benefits during the hiring process.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_7732e8ed-b24","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Synopsys","sameAs":"https://careers.synopsys.com","logo":"https://logos.yubhub.co/careers.synopsys.com.png"},"x-apply-url":"https://careers.synopsys.com/job/exton/cyber-security-engineer-agi-ansys-government-initiatives/44408/92312998208","x-work-arrangement":"onsite","x-experience-level":"mid","x-job-type":"full-time","x-salary-range":"$101000-$152000","x-skills-required":["host-based firewalls","intrusion prevention systems (IPS)","anti-virus software","SELinux","network firewalls","SIEMs","proxies","Security Information and Event Management (SIEM) feeds","Data Loss Prevention (DLP) signatures","Microsoft O365","Palo Alto","McAfee ePO","QRadar","custom dashboards","incident response","chain of custody","investigations","network and host traffic","anomalous activity","threat mitigation"],"x-skills-preferred":["open source intelligence (OSINT)","behavioral analysis","evolving threat landscapes","security controls","security tools","platforms","technical leadership","user education","relationship management"],"datePosted":"2026-03-08T22:20:01.199Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Exton, Pennsylvania"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"host-based firewalls, intrusion prevention systems (IPS), anti-virus software, SELinux, network firewalls, SIEMs, proxies, Security Information and Event Management (SIEM) feeds, Data Loss Prevention (DLP) signatures, Microsoft O365, Palo Alto, McAfee ePO, QRadar, custom dashboards, incident response, chain of custody, investigations, network and host traffic, anomalous activity, threat mitigation, open source intelligence (OSINT), behavioral analysis, evolving threat landscapes, security controls, security tools, platforms, technical leadership, user education, relationship management","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":101000,"maxValue":152000,"unitText":"YEAR"}}}]}