Senior SIEM Engineer (L6) - 100% remote
Apollo.io
⚲ Remote
25 000 - 38 000 PLN (PERMANENT)
Wymagania
- Security
- SIEM
- Python
- Panther (nice to have)
- GCP (nice to have)
- Azure (nice to have)
- AWS (nice to have)
- Ruby (nice to have)
- Ruby on Rails (nice to have)
- GCIA (nice to have)
- GCIH (nice to have)
- Security+ (nice to have)
- GCED (nice to have)
- SaaS (nice to have)
Opis stanowiska
O projekcie: The Security Operations Engineer is a senior individual contributor responsible for detecting, investigating, and responding to security threats across Apollo’s cloud-native and SaaS environments. This role requires strong technical depth, independent judgment, and ownership of complex security investigations from intake through resolution. This role operates in a fully remote environment and emphasizes clear written communication, operational rigor, and effective collaboration. This is how we organize our work This is how we work - in house - you can change the project - you have influence on the choice of tools and technologies - you have influence on the technological solutions applied - you have influence on the product - you develop the code "from scratch" - you focus on product development - agile Development opportunities we offer - development budget - industry-specific e-learning platforms - intracompany training - technical knowledge exchange within the company What we offer - Base salary + 10% yearly bonus + equity - Contract of employment (Polish UoP) - 100% remote work (we don’t have offices and we don’t plan to have them) - no hybrid, no forcing people to get back to the offices - Allianz Medical Package and Warta Life Insurance covered by Apollo - 1200 USD educational budget - 300 USD Work From Home Stipend - 4 additional PTO days for Engineering (Rest Days) - 100% remote work and flexible working hours We are AI Native Apollo.io is an AI-native company built on a culture of continuous improvement. We’re on the front lines of driving productivity for our customers—and we expect the same mindset from our team. If you're energized by finding smarter, faster ways to get things done using AI and automation, you'll thrive here. What You’ll Love About Apollo Besides the great compensation package and culture that thrives in openness and excellence, we invest tremendous effort into developing our remote employees’ careers. The team embraces that we have a sole purpose: to help customers maximize their full revenue potential on the Apollo platform. This mindset opens us up to a lot of creative approaches to making customers successful at scale. You’ll be a significant part of a lean, remote team, empowered to really own your role as a proactive educator. We’re very collaborative at Apollo, so you’ll be able to lean on your teammates, even in adjacent departments, to help you achieve lofty goals. You’ll be supported and encouraged to experiment and take educated risks that lead to big wins. And, you’ll have a whole team remotely by your side to help you do it! Wymagania: Required Skills & Experience - 5+ years of experience in Security Operations or Incident Response. - Hands-on experience with SIEM platforms (experience with Panther is highly valued), log analysis, and detection engineering. - Experience investigating security incidents in cloud-native environments (GCP preferred; AWS and Azure also relevant) and SaaS applications. - Experience automating security workflows and investigations. - Proficiency in Python; familiarity with Ruby preferred. - Ability to operate independently, prioritize effectively, and make sound technical decisions under pressure. Preferred Qualifications - Experience using AI or ML-powered security tools for detection, investigation, or response. - Familiarity with vulnerability management concepts and remediation workflows. - Relevant certifications such as GCIA, GCIH, GCED, AWS / GCP Security certifications, or Security+. - Prior experience working in fully remote, distributed teams. Codzienne zadania: - Monitor, triage, and investigate security alerts and events across cloud infrastructure, SaaS applications, and corporate systems. - Conduct end-to-end security investigations, including scoping, containment, eradication, recovery, and documentation. - Own investigations independently while collaborating effectively during high-severity incidents. - Configure and maintain SIEM detections in Panther, including use cases, correlation rules, alert logic, and tuning. - Onboard, validate, and maintain log sources to ensure visibility, accuracy, and reliability. - Design and improve investigation and response workflows to streamline triage, escalation, and resolution. - Leverage AI-assisted tools to accelerate alert analysis, enrichment, and investigation efficiency. - Perform proactive threat-hunting activities to identify malicious or anomalous behavior not surfaced by existing detections. - Investigate abuse, fraud, account compromise, and automation misuse scenarios in close collaboration with Fraud teams. - Identify detection gaps and propose, implement, and validate improvements. - Build scripts, automations, and tools to reduce manual work and improve response speed and consistency. - Use Python extensively for analysis, automation, and internal tooling; Ruby experience is a plus. - Contribute to internal detection frameworks, tool. - Produce clear, high-quality documentation for incidents, investigations, and post-incident reviews. - Contribute to runbooks, playbooks, and operational standards. - Share knowledge, review peer work, and mentor other engineers.