Company Name: Autodesk
Location: Remote – CA, United States
Job Type: Full-time
Salary Range: $90.5K – $156.2K yearly (for U.S.-based roles; may exceed this range based on experience and location, plus potential annual cash bonuses, commissions for sales roles, stock grants, and a comprehensive benefits package)
Industry: Software / Technology (specifically Information Security)
Job Overview
Autodesk is a global leader in Software and Technology, creating innovative cloud data platform components for design and making software across various industries. We are seeking a highly skilled and analytical Security Analyst – Triage (also referred to as Triage Analyst) to join our team, working remotely from California, United States. This Full-time, Mid-Level role offers a pivotal opportunity to directly contribute to our Information Security efforts by monitoring, detecting, and responding to security incidents across our global infrastructure.
As a Security Analyst – Triage, you will be instrumental in monitoring alerts and events from various security tools, detecting anomalies across endpoints, networks, and application logs, and conducting initial analysis of critical logs. You will leverage your technical depth in areas like malware analysis, host analysis, and digital forensics, coupled with a strong understanding of Security Operations and Incident Response processes, to execute containment actions and escalate complex issues. If you are a proactive problem-solver with excellent critical thinking skills, thrive in a fast-paced environment, and are committed to maintaining a high level of confidentiality and integrity, Autodesk invites you to contribute your expertise to our robust security posture.
Duties and Responsibilities
- Monitor alerts and events from EDR (Endpoint Detection and Response), SIEM (Security Information and Event Management), network, and cloud security tools.
- Detect anomalies across endpoints, networks, and application logs, identifying potential threats.
- Conduct initial analysis of firewall, proxy, and Active Directory logs to pinpoint security incidents.
- Execute containment actions strictly according to playbooks and escalate complex issues promptly when necessary.
- Document incident details and remediation steps meticulously in the case management system.
- Create and maintain comprehensive process documentation and runbooks for incident response procedures.
- Partner with engineering and detection teams to continuously refine alert rules and workflows, improving security posture.
- Communicate findings clearly to stakeholders, ensuring transparent and timely updates.
- Assist in SOAR (Security Orchestration, Automation, and Response) platform enhancements and playbook updates.
- Participate in post-incident reviews and identify opportunities for process optimization and improvement.
- Track triage metrics and contribute to the monthly business review, providing insights into security operations.
- Participate in the On-Call rotation for 24/7 environment support, providing critical coverage when needed.
- Maintain a high level of confidentiality and integrity in handling sensitive security information.
- Apply a BS in Computer Science, Information Security, or equivalent professional experience.
- Possess 2+ years of cybersecurity experience in incident response.
- Possess technical depth in one or more specialties: Malware analysis, Host analysis, and Digital forensics.
- Maintain a strong understanding of Security Operations and Incident Response process and practices.
- Possess experience performing security monitoring, response capabilities, log analysis, and forensic tools.
- Maintain a strong understanding of operating systems including Windows, Linux, and OSX.
- Possess experience with SIEM, SOAR, EDR, Network, AWS, and Azure security tools.
- Exhibit excellent critical thinking and analytical skills, organizational skills, and the ability to work as part of a team.
- Demonstrate excellent verbal and written communication skills.
- Possess the ability to design playbooks for responding to security incidents.
- Possess the ability to support off-hours, weekends, and holidays if needed in support of incident response.
- Potentially leverage advanced interpersonal skills to effectively promote ideas and collaboration (preferred).
- Possess one or more security-related certifications (GCIH, GCFE, GCFA, AWS, Azure Cloud security Certifications or equivalent) (preferred).
Qualifications
- Experience Level: Mid-Level (2+ years of cybersecurity experience).
- Education Requirement: BS in Computer Science, Information Security, or equivalent professional experience.
- Required Skills:
- BS in Computer Science, Information Security, or equivalent professional experience.
- 2+ years of cybersecurity experience in incident response.
- Technical depth in one or more specialties: Malware analysis, Host analysis, and Digital forensics.
- Strong understanding of Security Operations and Incident Response process and practices.
- Experience performing security monitoring, response capabilities, log analysis, and forensic tools.
- Strong understanding of operating systems including Windows, Linux, and OSX.
- Experience with SIEM, SOAR, EDR, Network, AWS, and Azure security tools.
- Excellent critical thinking and analytical skills, organizational skills, and the ability to work as part of a team.
- Excellent verbal and written communication skills.
- Ability to design playbooks for responding to security incidents.
- Ability to support off-hours, weekends, and holidays if needed in support of incident response.
- Proven ability to monitor alerts and events from EDR, SIEM, network, and cloud security tools.
- Skilled in detecting anomalies across endpoints, networks, and application logs.
- Proficient in conducting initial analysis of firewall, proxy, and Active Directory logs.
- Capable of executing containment actions per playbooks and escalating complex issues.
- Skilled in documenting incident details and remediation steps in the case management system.
- Proficient in creating and maintaining process documentation and runbooks.
- Experience partnering with engineering and detection teams to refine alert rules and workflows.
- Skilled in communicating findings clearly to stakeholders.
- Proficient in assisting in SOAR platform enhancements and playbook updates.
- Experience participating in post-incident reviews and identifying opportunities for process optimization.
- Skilled in tracking triage metrics and contributing to monthly business review.
- Proficient in participating in the On-Call rotation for 24/7 environment support.
- Committed to maintaining a high level of confidentiality and integrity.
- Preferred Qualifications: Advanced interpersonal skills to effectively promote ideas and collaboration; one or more security-related certifications (GCIH, GCFE, GCFA, AWS, Azure Cloud security Certifications or equivalent).
Salary and Benefits
Autodesk offers competitive compensation for this Full-time Security Analyst – Triage position. The salary range for U.S.-based roles is $90.5K – $156.2K yearly, and may exceed this range based on experience and location. This includes potential annual cash bonuses, commissions for sales roles, stock grants, and a comprehensive benefits package. We believe in rewarding top talent and fostering a supportive work environment. Beyond salary, Autodesk is committed to providing a comprehensive benefits package designed to support your overall well-being and professional growth, which typically includes robust health, dental, and vision insurance, generous paid time off, and opportunities for continuous professional development.
Working Conditions
This is a Full-time, Remote position, operating from California, United States. You will work from your home office, utilizing various security tools, SIEM, SOAR platforms, and communication channels. The role demands strong analytical, critical thinking, and problem-solving skills, with a significant focus on incident response and security monitoring. You will be expected to work as part of a team, maintain confidentiality, and potentially support off-hours, weekends, and holidays as part of an on-call rotation for 24/7 environment support. The environment is fast-paced and requires continuous vigilance.
Why Work with Us
Autodesk is a global leader in Software and Technology, empowering innovators to design and make a better world. We create groundbreaking cloud data platform components for design and making software, and your role is vital in safeguarding our digital assets. Joining us as a Security Analyst – Triage means becoming a pivotal contributor to our robust Information Security posture.
We offer a challenging yet incredibly rewarding environment where your cybersecurity expertise in incident response, log analysis, and forensic tools will be highly valued. You will be empowered to detect anomalies, conduct initial analysis of threats, and contribute to process optimization initiatives. If you are a results-driven professional with a strong understanding of security operations, a commitment to confidentiality, and a desire to make a tangible impact on cutting-edge software security, Autodesk offers an unparalleled opportunity for your next career chapter.