Staff SOC Digital Forensics San Francisco

Staff SOC Digital Forensics San Francisco

Deadline : 01 Feb, 2026

We are looking for an inspired and motivated experienced technical leader to join the DigitalOcean Security Operations Center (SOC).  In this role, you will be the lead technical contributor on DigitalOcean’s Digital Forensics and Incident Response (DFIR) team, charged with improving the security posture of DigitalOcean both reactively and proactively, ensuring a secure cloud infrastructure for both customers and internal users.

You will leverage advanced knowledge of DFIR and enterprise security practices. You will use your deep analytical skills to develop mitigations to prevent malicious harms. You will apply engineering skills to mature our detection and response functions.

With over 600,000 customers utilizing 11 data centers and 15,000+ hypervisors every day, our Security Operations Center never loses sight of the role we play in making the internet a more secure place for everyone.

What You’ll Be Doing:

  • Establish an understanding of DigitalOcean’s entire production environment, from applications to infrastructure, keeping up-to-date with material changes and future directions.
  • Lead live intrusions and incident response investigations with on-call responsibilities, in a customer-oriented and transparent manner, to minimize the impact of malicious actors.
  • Collect digital artifacts from cloud, on-premise, and employee systems for analysis to reconstruct what may have occurred on a system leveraging digital forensics methodologies.
  • Use advanced network traffic analysis techniques to identify compromised systems, negate denial of service attacks, and pinpoint resource anomalies.
  • Identify trends in malicious activity, inform leadership, and perform preventative measures.
  • Act as a point of contact for security and related incidents: providing supporting data for critical issues, downtime events, root causes, and post-mortem reports.
  • Build tools to identify and automate response to malicious activity with enhancements to refine incident response procedural documentation as needed.
  • Build strong relationships with technical teams across all business functions to harden account, platform, and service structures to combat intrusions, compromises, and disruptions.
  • Effectively communicate and collaborate with staff including legal counsel, trust & governance, and executive leadership.
  • Engage in R&D efforts to identify and develop the latest forensic tools, techniques, and procedures.
  • Implement technical recommendations that mature incident response and digital forensics capabilities.
  • Provide comprehensive feedback and technical advice to juniors and peers to increase team maturity and speed of advancement.

What We’ll Expect From You:

  • 10+ years minimum, of job related experience leading live incident response activities transparently, in a fast-paced team environment where accuracy of analysis determines business impact.
  • Ability to differentiate between normal and unusual resource usage patterns in customer and employee network/system behaviors in order to hunt for subtle anomalous patterns.
  • Hands-on experience with both dead-disk and live digital forensics, especially on Linux or Unix systems using open source tools (eg, volatility, sleuthkit) in an enterprise production environment at cloud scale.
  • Data analysis skills, including familiarity with relational databases, structured query languages, logging infrastructures, and data visualization tools.
  • Familiarity with basic static and dynamic malware analysis for triage, identification, prioritization, and remediation of new malware families and behaviors (e.g: x86 assembly, binary analysis).
  • A high degree of curiosity and aptitude, with a clear passion for security and the desire to keep our employees, customers, and the internet safe.
  • Clear written and verbal communication skills to include; technical writing, presenting, coaching, mentoring.
  • A proven track record of improving enterprise and operational security as the business scales, driving continuous improvement through data collection, correlation, and control enhancements.
  • Five or more years of experience maturing hands-on forensics and incident response protocols.
  • Ability to conduct vulnerability analysis, scoping, and mitigation planning for the internal employee environment.
  • Ability to perform comprehensive threat intelligence analysis based on proactive hunts with clear and concise dissemination of findings.
  • Ability to perform network protocol analysis and design of internal applications to recommend design changes as needed.
  • Proven coding skills to develop automations and custom tools reducing time and complexity.

To apply for this job please visit www.digitalocean.com.