Security Operations Engineer
Listed on 2025-12-21
-
IT/Tech
Cybersecurity
ABOUT FANDUEL
Fan Duel Group is the premier mobile gaming company in the United States and Canada. Fan Duel Group consists of a portfolio of leading brands across mobile wagering including:
America’s #1 Sports book, Fan Duel Sports book; its leading iGaming platform, Fan Duel Casino; the industry’s unquestioned leader in horse racing and advance-deposit wagering, Fan Duel Racing; and its daily fantasy sports product.
In addition, Fan Duel Group operates Fan Duel TV, its broadly distributed linear cable television network and Fan Duel TV+, its leading direct-to-consumer OTT platform. Fan Duel Group has a presence across all 50 states, Canada, and Puerto Rico.
The company is based in New York with US offices in Los Angeles, Atlanta, and Jersey City, as well as global offices in Canada and Scotland. The company’s affiliates have offices worldwide, including in Ireland, Portugal, Romania, and Australia.
Fan Duel Group is a subsidiary of Flutter Entertainment, the world’s largest sports betting and gaming operator with a portfolio of globally recognized brands and traded on the New York Stock Exchange (NYSE: FLUT).
THE POSITIONAs a valued member of the Security Operations Center (SOC) team, the Security Engineer will be responsible for early and accurate detection, response and containment of threats directed against the environment. This role requires advanced skills in intrusion detection and threat hunting to identify credible risks/adversaries to proprietary and sensitive data before a potential breach. Collaboration with other security engineers, developers, vendors and business units to constantly improve the overall security posture will be the key to success at Fan Duel Group.
We’re looking for a team player with highly technical analytical skills.
In addition to the specific responsibilities outlined above, employees may be required to perform other such duties as assigned by the Company. This ensures operational flexibility and allows the Company to meet evolving business needs.
THE GAME PLAN- Monitor and analyze network, server, endpoint, database, and application activities for indicators of compromise, minimizing false positives.
- Automate alert collection, prioritization, tasks and processes, periodic audits, and controls.
- Lead incident response efforts, conducting thorough remediation and root cause analysis.
- Enhance security posture for large-scale customer-facing hybrid cloud environment and internal workplace, leveraging MITRE ATT&CK tactics and techniques assessment.
- Drive growth and maturity of threat hunting program to proactively identify and mitigate security threats.
- Contribute to security process enhancement and documentation, staying abreast of cybersecurity developments to brief SOC director effectively.
- Evaluate and conduct proof-of-concepts for innovative technologies, collaborating with security engineers on implementation.
- Foster cross-departmental integration to establish strong business relationships, mentor business units in cybersecurity guidelines and best practices while promoting knowledge sharing and maintaining high customer service levels.
- Empathetic contributor who has experience operating effectively across teams and disciplines in highly ambiguous and rapidly changing environments and have successfully executed on ambitious projects
- Proficient experience working in cybersecurity operations and incident response, to include utilizing Security Information and Event Management (SIEM) platforms, Intrusion Detection/Prevention Systems (IDS/IPS), and Vulnerability Management and Threat Intelligence applications.
- Experience working with large, complex networks and systems
- Bachelor of Science degree in Information Security, Engineering, Computer Science or related field preferred
- Proficient understanding and applicability of MITRE ATT&CK framework (or other industry related frameworks)
- Programming/scripting experience (bash, python, Power Shell)
- Knowledge of log ingestion pipelines, log parsing, grok patterns and regular expressions
- Capable of writing detections using YAML and JSON styled languages
- Ability to write and automate security incident playbooks
- Excellent…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).