×
Register Here to Apply for Jobs or Post Jobs. X

Engineer - Information Security

Job in San Jose, Santa Clara County, California, 95199, USA
Listing for: TiVo Corporation
Full Time position
Listed on 2025-12-06
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Salary/Wage Range or Industry Benchmark: 90000 - 120000 USD Yearly USD 90000.00 120000.00 YEAR
Job Description & How to Apply Below

Xperi invents, develops and delivers technologies that create extraordinary experiences at home and on the go for millions of people around the world. Powering billions of consumer electronics, connected and digital content titles, we make entertainment more immersive, driving more intelligent and every interaction seamlessly personalized through our renowned consumer brands:

DTS®, HD Radio™andTiVo®.

Xperi (NYSE: XPER) is a publicly traded technology company headquartered in San Jose, CA with over 2,000 employees across North America, Europe and Asia. Come join a thriving team where you can play an integral role in shaping the future of entertainment technology

Job Summary:

The SOC Engineer is responsible for monitoring, detecting, analyzing, and responding to cybersecurity threats across the enterprise. This role ensures the confidentiality, integrity, and availability of systems and data by leveraging advanced security tools, threat intelligence, and incident response processes. The SOC Engineer works closely with other security teams to maintain a robust security posture and continuously improve detection and response capabilities.

Key Responsibilities
  • Continuously monitor security alerts and events across SIEM, EDR, IDS/IPS, firewalls, and cloud environments.
  • Correlate logs from multiple sources to identify patterns indicative of malicious activity.
  • Develop and maintain dashboards for real-time visibility into security posture.
  • Perform proactive threat hunting to identify anomalies and potential compromises before alerts are triggered.
  • Act as first responder for security incidents, ensuring timely triage and escalation.
  • Conduct in-depth forensic analysis on compromised systems, including memory dumps, network traffic, and log files.
  • Collaborate with IT and application teams to contain and eradicate threats.
  • Prepare detailed incident reports, including timelines, impact analysis, and lessons learned.
Security Tool Management
  • Configure, maintain, and optimize SOC technologies such as SIEM, SOAR, EDR, and threat intelligence platforms.
  • Develop and fine-tune correlation rules, detection signatures, and automated playbooks.
  • Integrate new log sources and ensure proper parsing and normalization for accurate detection.
  • Evaluate emerging security tools and recommend adoption to strengthen SOC capabilities.
  • Gather and analyze threat intelligence from internal and external sources.
  • Map indicators of compromise (IOCs) to MITRE ATT&CK framework for improved detection coverage.
  • Share actionable intelligence with relevant stakeholders to enhance preventive measures.
  • Track and report on evolving threat actor tactics, techniques, and procedures (TTPs).
Compliance & Reporting
  • Ensure SOC operations align with regulatory frameworks (e.g., PCI-DSS, HIPAA, ISO 27001).
  • Generate weekly and monthly SOC performance metrics, including mean time to detect (MTTD) and mean time to respond (MTTR).
  • Maintain accurate documentation of SOC processes, incident workflows, and audit trails.
  • Participate in red team/blue team exercises and penetration testing reviews.
  • Conduct post-incident reviews to identify gaps and recommend process improvements.
  • Collaborate with vulnerability management teams to prioritize remediation based on threat intelligence.
  • Provide training and mentorship to junior SOC analysts.
Required Qualifications
  • Bachelor’s degree in Cybersecurity, Computer Science, or related field (or equivalent experience).
  • 2+ years of experience in a SOC or security operations role.
Strong knowledge of:
  • SIEM platforms (e.g., Sentinel, Splunk, QRadar)
  • Network security concepts (firewalls, IDS/IPS)
  • Endpoint security and malware analysis
  • Familiarity with incident response frameworks (NIST, SANS).
  • Understanding of cloud security (AWS, Azure, GCP).
Preferred Qualifications
  • Certifications such as GCIA, GCIH, CEH, Security+, CySA+, or CISSP.
  • Experience with scripting (Python, Power Shell) for automation.
  • Knowledge of threat hunting and advanced persistent threats (APT).
Soft Skills & Attributes:
  • Strong analytical and problem-solving skills.
  • Excellent communication and interpersonal abilities.
  • Ability to manage multiple priorities in a fast-paced environment.
  • Detail-orient…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary