Senior Staff Security Operations Engineer

Life360
Summary
Join Life360's Information Security team as a Security Operations Manager and lead incident response efforts, perform forensic analysis, and enhance security platforms. You will monitor security events, implement log management and intrusion detection, and provide security input during design phases. The role involves on-call rotation and influencing key technical decisions to build cutting-edge security solutions. You will need 10+ years of hands-on experience in security operations and incident response in an AWS environment, proficiency in scripting and automation, and a strong understanding of cybersecurity threats and mitigations. Life360 offers competitive pay and benefits, including medical, dental, vision, life and disability insurance, a 401(k) plan, flexible PTO, and more. The position is remote-first within the US.
Requirements
- 10+ years of hands-on experience in security operations and incident response in an AWS environment
- Experience with SIEM, EDR, IDS/IPS, firewalls, and cloud security tools
- Proficiency in scripting and automation (Python, Bash, or SOAR solutions)
- Deep knowledge of digital forensics, log analysis, and vulnerability management
- Strong understanding of cybersecurity threats, vulnerabilities, and mitigations, with a proactive approach to embedding security throughout the product lifecycle
- Experience with modern application stacks, security tooling, and DevSecOps pipelines, with a passion for security automation and pragmatic defenses
- Exceptional ability to distill complex security concepts into clear actions, driving alignment across engineering teams without direct authority
- A collaborative mindset with a strong ability to build relationships, influence cross-functional teams, and lead high-impact security initiatives
- Creative and strategic thinker who can holistically reduce risk, scale security through smart design, and bring clarity to ambiguous challenges
- Maintains a security certification such as GIAC Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA), Offensive Security Certified Professional (OSCP), or similar
Responsibilities
- Lead and coordinate incident response efforts, including refining and maintaining incident plans and playbooks
- Perform forensic analysis, and act as the subject matter expert for major incidents and post-incident reviews
- Oversee and enhance SIEM, firewalls, and threat intel platforms to improve detection capabilities
- Monitor and analyze security events with logging tools, while driving automation and orchestration
- Implement and optimize log management, network monitoring, and intrusion detection capabilities
- Provide security input and recommendations during technical design and implementation phases
- Participate in the security on-call rotation to respond to and mitigate security incidents
- Influence key technical decisions and drive cross functional execution to build and manage cutting-edge security solutions
- Continuously evaluate and improve threat detection coverage, alert fidelity, and response automation
Benefits
- Competitive pay and benefits
- Medical, dental, vision, life and disability insurance plans (100% paid for employees)
- 401(k) plan with company matching program
- Mental Wellness Program & Employee Assistance Program (EAP) for mental well being
- Flexible PTO, 13 company wide days off throughout the year
- Winter and Summer Week-long Synchronized Company Shutdowns
- Learning & Development programs
- Equipment, tools, and reimbursement support for a productive remote environment
- Free Life360 Platinum Membership for your preferred circle
- Free Tile Products