Stripe is a financial infrastructure platform for businesses, providing the tools needed to accept payments, grow revenue and accelerate business opportunities.
About Our Mission
We aim to increase the GDP of the internet by enabling millions of companies to reach their full potential. This means you'll have an unprecedented opportunity to make a real impact on the global economy while doing the most important work of your career.
About the Team
This role plays a critical part in threat detection and response, working closely with our security teams to develop solutions that protect Stripe networks, systems and data from potential security threats.
Your Responsibilities
* Analyze activity on company devices that could represent a security threat, using log and data analysis to determine the severity and potential impact.
* Work cross-functionally with our Security teams to develop solutions for analyzing security events at scale, protecting Stripe networks, systems and data.
* Interpret disparate data sources to report on trends and support investigative requests, identifying areas for improvement and promoting process enhancements.
* Collect requirements for enhancements to detection models and response systems, leveraging existing systems and data to perform analyses.
* Provide actionable insights to help identify, prevent, detect and respond to anomalous or potentially malicious user activity.
* Collaborate effectively with teammates, lead projects, mentor others and develop quality operational standards across the team.
Your Qualifications
* A minimum of 5 years of experience in information technology or cyber security roles, including security operations/incident response.
* 2+ years of experience analyzing large data sets to solve problems and/or manage projects related to security event triage and/or workplace investigations.
* A degree in Cyber Security and Information Assurance, Data Analytics, Computer Science or a related field, or equivalent experience.
* Working knowledge of SQL and basic knowledge of scripting or programming in Python, Go or other programming languages.
* Proven experience with log querying and analysis, digital forensics or incident response using industry standard SIEM Platforms (Splunk, Sentinel, Chronicle, Elastic etc.).
* Proficiency in analytical methods to inform detection systems or guide strategic response.
* Strong cross-functional collaboration and written/verbal communication skills.
* Ability to think creatively and holistically about identifying and reducing risk in a complex environment.
* High level of judgment, objectivity and discretion.