refresh

热门公司

Trending

招聘

JobsF5 Networks

Senior Security Engineer / Tool Automation

F5 Networks

Senior Security Engineer / Tool Automation

F5 Networks

Hyderabad

·

On-site

·

Full-time

·

1w ago

Benefits & Perks

Healthcare

401(k)

Equity

Remote Work

Healthcare

401k

Equity

Remote Work

Required Skills

Threat Hunting

Digital Forensics

Incident Response

DFIR

SIEM

NG-SIEM

SOAR

EDR

XDR

Python

Cloud Security

AWS

Azure

GCP

Linux

Terraform

Ansible

At F5, we strive to bring a better digital world to life. Our teams empower organizations across the globe to create, secure, and run applications that enhance how we experience our evolving digital world. We are passionate about cybersecurity, from protecting consumers from fraud to enabling companies to focus on innovation.

Everything we do centers around people. That means we obsess over how to make the lives of our customers, and their customers, better. And it means we prioritize a diverse F5 community where each individual can thrive.

Join a high-impact team using cutting-edge security technologies and practices to protect F5’s enterprise and product environments. As a Senior Security Engineer / Threat Hunter, you will lead strategic initiatives, develop technical solutions, and drive continuous improvements in our cyber defense capabilities. You’ll be a key player in threat hunting, incident response, proactive detection, and digital forensics across cloud and on‑prem environments.

Key Responsibilities

  • Lead threat hunting engagements for the Global Cyber Security Detections and Investigations team across enterprise and product environments.
  • Lead and guide team members in threat hunting and digital forensics practices, including mentoring and upskilling efforts.
  • Perform proactive threat hunting and host/cloud forensics (AWS, Azure, GCP, Linux, Windows, macOS), including acquisition and analysis of endpoint, network, and cloud artifacts.
  • Conduct technical security assessments, including static/dynamic analysis, threat modeling, and forensic reconstruction of attack timelines.
  • Automate manual processes to reduce operational toil and improve response times, including automation of common forensic and hunting workflows.
  • Collaborate with SRE, Architecture, and Operations teams to implement security standards and controls informed by hunting and forensic findings.
  • Utilize security tooling (EDR, NG‑SIEM, SOAR, DLP, vulnerability scanners, posture management) to detect, investigate, and contain threats.
  • Advise stakeholders on secure design principles and security best practices based on observed attacker behaviors and forensic investigations.
  • Maintain and improve security runbooks and documentation, including incident response, threat hunting, and DFIR playbooks.
  • Stay current on emerging threats, CVEs, attacker TTPs, and industry trends and apply them to hunting and forensic techniques.
  • Follow F5 information security policies and protect information assets from unauthorized access, disclosure, modification, destruction, or interference.
  • Perform other related duties as assigned.
  • Follow the F5 behaviors.

Required Skills & Experience

  • 8+ years in cybersecurity, including hands‑on threat hunting, digital forensics and incident response (DFIR), and security engineering.
  • Proven experience designing and executing hypothesis‑driven threat hunts across endpoints, networks, and cloud environments, and operationalizing findings into new detections or controls.
  • Demonstrated hands-on experience performing endpoint and cloud forensics (for example, disk and memory acquisition, log and artifact analysis, timeline reconstruction) during investigations.
  • Strong experience with SIEM and NG‑SIEM platforms (e.g., Crowd Strike Falcon, Splunk, Microsoft Sentinel), SOAR, and EDR/XDR tools as primary data sources for hunting.
  • Deep understanding of MITRE ATT&CK and threat actor TTPs, and ability to translate them into hunt hypotheses, queries, and forensic pivot points.
  • Proficiency in scripting or utilizing automation tools (Python, Power Apps, Power Automate, or similar) to automate hunting and forensic data collection, enrichment, and reporting.
  • Hands-on experience with cloud security (AWS, Azure, GCP) and infrastructure as code (Terraform, Ansible).
  • Solid grasp of UNIX/Linux systems, networking protocols, and firewall architecture.
  • Experience with vulnerability management, penetration testing, and secure architecture design.
  • Excellent communication skills with ability to interface across technical and non‑technical stakeholders and clearly convey hunt findings and investigative outcomes.

Preferred Qualifications

  • Certifications: GCIH, GCFR, GCFA, or equivalent SANS DFIR / threat hunting training.
  • Experience with Service Now, ADO, or similar ticketing/case management systems.
  • Familiarity with container orchestration (Kubernetes, Docker) and CI/CD pipelines.
  • Exposure to FedRAMP, e Discovery, and DLP casework.
  • Strong interpersonal skills and a collaborative mindset.
  • Ability to lead and mentor junior engineers and analysts in threat hunting and DFIR methodologies.
  • Ability to drive strategic long‑term initiatives with cross‑org leaders.
  • Ability to effectively present technical investigations, threat hunts, and recommendations to executive leadership.

Work Environment

  • Full-time position with potential for shift flexibility.
  • Requires scheduled on‑call work outside core business hours (early mornings, evenings, weekends, holidays) shared with the larger team.
  • Duties performed at a desk or computer station; remote collaboration across time zones.

The Job Description is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change.

Please note that F5 only contacts candidates through F5 email address (ending with @f5.com) or auto email notification from Workday (ending with f5.com or @myworkday.com).

Equal Employment Opportunity

It is the policy of F5 to provide equal employment opportunities to all employees and employment applicants without regard to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical, or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. This policy applies to all aspects of employment, including, but not limited to, hiring, job assignment, compensation, promotion, benefits, training, discipline, and termination. F5 offers a variety of reasonable accommodations for candidates. Requesting an accommodation is completely voluntary. F5 will assess the need for accommodations in the application process separately from those that may be needed to perform the job. Request by contacting accommodations@f5.com.

Total Views

1

Apply Clicks

0

Mock Applicants

0

Scraps

0

About F5 Networks

F5 Networks

A multi-cloud application services and security company that specializes in application security, performance, and delivery.

5,001-10,000

Employees

Seattle

Headquarters

$2.8B

Valuation

Reviews

3.8

5 reviews

Work Life Balance

3.5

Compensation

4.0

Culture

3.5

Career

3.0

Management

3.0

Pros

Good salary and compensation

Good benefits and health insurance

Great work-life balance and flexibility

Cons

Management issues and favoritism

High workload and weekend coverage

Limited career growth opportunities

Salary Ranges

14 data points

Junior/L3

Mid/L4

Junior/L3 · Data Analyst

0 reports

$83,000

total / year

Base

-

Stock

-

Bonus

-

$70,550

$95,450

Interview Experience

1 interviews

Difficulty

4.0

/ 5

Duration

14-28 weeks

Interview Process

1

Application Review

2

Recruiter Screen

3

Technical Phone Screen

4

Onsite/Virtual Interviews

5

Final Round Interview

Common Questions

Coding/Algorithm

System Design

Behavioral/STAR

Technical Knowledge

Network/Infrastructure Concepts