Staff Security Platform Engineer

Aurora Innovation Aurora Innovation · Robotics · Mountain View, CA · Security

Staff Security Platform Engineer responsible for the operational health, configuration, and continuous improvement of Aurora's enterprise security platform stack, including EDR/XDR, MDM, SIEM, DLP, IAM/IGA, DNS security, Email security, and PKI. This role involves developing and refining detection rules, conducting proactive threat hunting, and serving as the deepest internal expert on security tooling.

What you'd actually do

  1. Own the operational health, configuration, and continuous improvement of Aurora's enterprise security platform stack — including EDR/XDR, MDM, SIEM, DLP, IAM/IGA, DNS security, Email security, and PKI — ensuring each tool is tuned, policy-complete, and delivering reliable signal.
  2. Develop and refine detection rules, correlation logic, and alert policies, reducing noise while ensuring Aurora maintains high-fidelity coverage against real threats.
  3. Conduct proactive threat hunting across Aurora's security telemetry — forming hypotheses, querying logs, and investigating anomalies before they surface as incidents.
  4. Serve as the deepest internal expert on Aurora's enterprise security tooling, acting as the escalation point for complex platform issues, misconfigurations, and detection failures.
  5. Participate in the team's on-call rotation, leading deep-dive investigations into security alerts and incidents and driving triage, containment, and root cause analysis.

Skills

Required

  • enterprise security operations
  • security platform administration
  • senior SOC engineering
  • EDR/XDR
  • MDM
  • SIEM
  • DLP
  • IAM/IGA
  • DNS security
  • Email security
  • PKI
  • detection rules
  • correlation logic
  • alert policies
  • threat hunting
  • log analysis
  • incident investigations
  • triage
  • containment
  • root cause analysis
  • security control effectiveness assessment

Nice to have

  • Python
  • Bash
  • MITRE ATT&CK
  • AWS security telemetry
  • CloudTrail
  • GuardDuty
  • Security Hub
  • Zero Trust
  • identity-centric security models
  • CrowdStrike Certified Falcon Administrator
  • Splunk Core Certified Power User
  • GCIH
  • GCIA
  • GCFE
  • GCFA

What the JD emphasized

  • career built on deep operational ownership of security tooling rather than software development
  • Expert-level proficiency administering and operating at least two enterprise security platforms
  • Demonstrated ability to tune and optimize security platforms beyond out-of-the-box configurations
  • Strong log analysis and threat hunting skills
  • Ability to assess security control effectiveness
  • not just deployed, but deeply configured, continuously tuned, and fully leveraged
  • deeply configured, continuously tuned, and fully leveraged
  • deep satisfaction in mastering a tool, closing a coverage gap, or hunting down a threat that nobody else noticed