×
Register Here to Apply for Jobs or Post Jobs. X

Security Operations Engineer

Job in Coos Bay, Coos County, Oregon, 97458, USA
Listing for: Calendly
Full Time position
Listed on 2026-02-14
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below

What’s in it for you?

Ready to make a serious impact? Millions of people already rely on Calendly, and we’re still in the midst of exciting product growth — it’s a fantastic time to join us. Everything you’ll work on here will accelerate your career to the next level. If you want to learn, grow, and do the best work of your life alongside the best people you’ve ever worked with, then we hope you’ll consider allowing Calendly to be a part of your professional journey.

About

the team & opportunity

What’s so great about working on Calendly’s Security team?

We make things possible for our customers through innovation.

Calendly is seeking a Security Engineer who will bring curiosity, technical knowledge and desire to up-level people around you. You will report to the Head of Security Operations and will be responsible for many of the key functions around security operations including incident response, enterprise level security and enhancing threat detection capabilities.

A day in the life of a Security Operations Engineer at Calendly

On a typical day, you will be working on:

  • Collaborating with Security Operations Center (SOC) team members to monitor, detect, and respond to cybersecurity threats in a timely manner.
  • Responding to cybersecurity incidents from identification through resolution.
  • Developing and maintaining up-to-date knowledge of the threat landscape, as well as advancements in cybersecurity technologies and methodologies.
  • Identifying, configuring and onboarding security telemetry sources/logs in support of threat detection and incident response
  • Collaborating with Engineering and SRE to identify and mitigate logging deficiencies
  • Developing new detection scenarios and queries to broaden and deepen the team’s detection coverage
  • Tuning and continuously improving existing detection queries to increase signal-to-noise ratio, and ensure our detections remain relevant and functional
  • Executing and improving incident response protocols and procedures to swiftly and effectively manage security incidents.
  • Identifying, developing and maintaining automation solutions to increase the efficiency and effectiveness of the team
  • Integrating various security and IT tools to enhance threat detection, incident response, and operational efficiency.
  • Conducting regular security assessments, threat hunts, and continuous monitoring to identify vulnerabilities, opportunities for posture enhancements and better incident preparedness.
  • Collaborating with Engineering, IT and other departments to support the implementation and evangelization of established cybersecurity best practices across the organization.
  • Leveraging JIRA for creating and managing dashboards, reports, and metrics that support cybersecurity operations and decision-making.
What do we need from you?
  • A minimum of 3 years of experience in cybersecurity, with at least 2 years dedicated to security operations, a SOC environment and enterprise security.
  • Demonstrated experience in incident response, including developing and implementing incident response playbooks and procedures, acting as incident commander on low severity incidents, and conducting post-incident analysis.
  • Experience with JIRA or similar tools for creating dashboards, managing reports, and automating workflows to support cybersecurity operations.
  • Proven track record in threat detection
  • Strong knowledge in operating and configuring SIEM tools (e.g., Splunk, ELK) for real-time threat monitoring and analysis.
  • Solid understanding of security technologies such as EDR (Endpoint Detection and Response), firewalls, and vulnerability scanners.
  • Demonstrated track record of automating SOC processes, enhancing threat detection, or streamlining incident response using Python
  • Proficient knowledge of threat actor behaviors, techniques and tools
  • Experience investigating security events on MacOS, Linux and Windows systems
  • Experience investigating security events in cloud environments including AWS and/or GCP
  • Authorized to work lawfully in the United States of America as Calendly does not engage in immigration sponsorship at this time
Additional Valued Skills
  • Experience with automating deployment and administration of detection…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary