Detection and Response Leader
Apply NowCompany: Cerebras Systems
Location: Toronto, ON M4E 3Y1
Description:
Cerebras Systems builds the world's largest AI chip, 56 times larger than GPUs. Our novel wafer-scale architecture provides the AI compute power of dozens of GPUs on a single chip, with the programming simplicity of a single device. This approach allows Cerebras to deliver industry-leading training and inference speeds and empowers machine learning users to effortlessly run large-scale ML applications, without the hassle of managing hundreds of GPUs or TPUs.
Cerebras' current customers include global corporations across multiple industries, national labs, and top-tier healthcare systems. In January, we announced a multi-year, multi-million-dollar partnership with Mayo Clinic, underscoring our commitment to transforming AI applications across various fields. In August, we launched Cerebras Inference, the fastest Generative AI inference solution in the world, over 10 times faster than GPU-based hyperscale cloud inference services.
About The RoleWe are seeking a highly skilled and motivated leader for the cybersecurity detection and response pillar.
The detection and response lead will be responsible for the design, buildout and operations of the Cerebrass detection and response capabilities, from the security data lake to detection engineering, 24/7 security operations center and incident response.
The right candidate will have battle scars from years of building cutting edge detection and response teams, and running point on security incidents as they emerge, contained and mitigated.
Responsibilities- Design, architect and build a full-scale security analytics, automation and response ecosystem on top of a security data lake.
- Strategize, recruit, and lead a high-caliber blue team spanning security analysts to forensic experts.
- Implement automations to reduce detection time and automated playbooks to respond to known and unknown attack vectors.
- Improve detection and response capabilities through threat intelligence integrations, rigorous testing, and iterative process enhancements.
- Minimum 8-10 years of progressive experience in cybersecurity with a proven track record in detection, response, and incident management.
- Demonstrated proficiency in architecting and implementing security analytics ecosystems, including the use of centralized security data lakes.
- Extensive experience with security automation frameworks, orchestration tools, and the development of automated playbooks for incident response.
- In-depth knowledge of detection engineering, threat intelligence, and forensic methodologies.
- Proven ability to design and operate 24/7 Security Operations Center (SOC) environments.
- Extensive software engineering background.
- Strong organizational skills with the ability to multitask and prioritize.
- Detail-oriented with the ability to anticipate the needs of customers and internal stakeholders.
- Proactive, adaptable, and able to thrive in a rapidly changing environment.
- Excellent verbal and written communication skills.