Security Analyst, SDR Security Operations
Meta
Job Overview
Who's the hiring manager?
Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Job Description
About Meta
Meta builds technologies that help people connect, find communities, and grow businesses. Since Facebook launched in 2004, it has changed how people connect. Apps like Messenger, Instagram, and WhatsApp further empower billions around the world. Now, Meta is moving beyond 2D screens toward immersive experiences like augmented and virtual reality to help build the next evolution in social technology. People who choose to build their careers by building with us at Meta help shape a future that will take us beyond what digital connection makes possible today—beyond the constraints of screens, the limits of distance, and even the rules of physics.
Security Analyst, SDR Security Operations at Meta
Meta is seeking a Security Analyst, SDR Security Operations to join the Global Security Operations team. This Analyst will serve on the front lines of Meta’s Security team and will lead and support security investigations across the company’s global infrastructure as well as respond to escalations from the Tier1 team. The analyst will leverage an armory of tools to investigate and respond to both external and internal security threats. Utilizing Meta’s tooling, you will monitor security events in real-time, assess external and internal threats, and provide accurate and timely response. You will collaborate closely with technical teams, with a wide set of skills to tackle the panoply of unique security challenges that we encounter at Meta scale.
Responsibilities
- Investigate and respond to external and internal cybersecurity threats in a timely manner while communicating clearly and proactively until remediation.
- Drive changes to processes that scale across teams and regions and affect organizations outside Security.
- Act as an escalation point for Tier1 investigations, contribute to the development of the Tier1 capability and related service level objectives.
- Document security investigations and produce high quality and accurate reports for a wide range of stakeholders.
- Collaborate with Security Engineers and cross-functional teams to investigate and remediate large scale security incidents.
- Support security incidents root cause analysis, identify control gaps and recommend mitigation strategies.
- Collaborate with cross-functional teams to drive improvements to security policies, processes and tools.
- Improve the effectiveness and efficiency of the Security Operations and Incident Response team including development and refinement of processes and technical capabilities.
- Understand and support requirements of internal and external stakeholders, regulators, and auditors.
Minimum Qualifications
- Bachelor’s or Master's degree in Computer Science or related technical field, or equivalent experience in cyber security.
- 5+ years of professional experience in a Security Operations Center, Incident Response, or relevant investigative role.
- 5+ years of experience navigating and understanding Windows, macOS, and Linux operating systems.
- Knowledge of networking technologies, specifically TCP/IP and related protocols.
- Experience analyzing network and host-based security events.
- Professional experience using a wide range of investigative tools including EDR, SIEM/SOAR, UBA.
- Professional experience with database query languages (e.g., SQL).
- Professional experience handling digital forensic evidence and developing reports to support internal investigations.
- Experience with attacker tactics, techniques, and procedures.
- Experience making important decisions independently and multi-tasking under pressure.
- Experience responding quickly to changing situations without compromising quality.
Preferred Qualifications
- Previous experience as a Lead Security Analyst in a large and regulated organization.
- Experience handling and triaging malware.
- Experience driving changes to processes and tools that scale across a global security operations team.
- Experience working in a 24x7 operational environment, and a track record of defining, implementing and measuring success of operational programs.
Key skills/competency
- Security Operations Center
- Incident Response
- Cybersecurity Investigations
- Threat Detection
- Digital Forensics
- EDR (Endpoint Detection and Response)
- SIEM/SOAR (Security Information and Event Management/Security Orchestration, Automation and Response)
- SQL (Structured Query Language)
- Operating Systems (Windows, macOS, Linux)
- Network Security (TCP/IP)
How to Get Hired at Meta
- Research Meta's culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor.
- Tailor your resume: Highlight extensive experience in SOC, incident response, digital forensics, and working with global infrastructure.
- Master technical skills: Showcase deep expertise in EDR, SIEM/SOAR, SQL, networking, and Windows, macOS, Linux operating systems.
- Prepare for behavioral questions: Demonstrate strong independent decision-making, effective multi-tasking under pressure, and proactive communication.
- Showcase problem-solving: Be ready to discuss how you've driven process changes and handled large-scale security incidents.
Frequently Asked Questions
Find answers to common questions about this job opportunity
Explore similar opportunities that match your background