About the company
Founded in Paris in 2014, LEDGER is a global platform for digital assets and Web3. Ledger is already the world leader in Critical Digital Asset security and utility. With more than 6M devices sold to consumers in 200 countries and 10+ languages, 100+ financial institutions and brands as customers, 20% of the world’s crypto assets are secured, plus services supporting trading, buying, spending, earning, and NFTs. LEDGER’s products include: Ledger Stax, Nano S Plus, Nano X hardware wallets, LEDGER Live companion app, [ LEDGER ] Market, the world’s first secure-minting and first-sale distribution platform, and Ledger Enterprise. With its ease of use, LEDGER allows a user to begin investing in digital assets and ultimately, achieve financial freedom in a safe and stress-free environment.
Job Summary
Your mission
đź“ŤLedger is seeking a Security Operations Engineer with experience in scale-up environments and an interest in Web3 and blockchain security. In this role, you will contribute to detecting and mitigating threats across Ledger's infrastructure, managing SaaS security tools, and conducting threat-hunting activities. While some collaboration on blockchain-related risks will occur with the Donjon (Product Security Team), the primary focus is on operational security, including threat detection, automation, and incident response. This is an excellent opportunity to secure a fast-paced, SaaS-heavy environment while engaging with innovative Web3 technologies.
In this role you will:
đź“ŤSecurity Monitoring & Incident Response: Monitor and analyze security events using tools like Sekoia (SIEM) and SentinelOne (EDR) to identify and mitigate threats effectively. Develop and refine detection logic, including Indicators of Compromise (IOCs), to improve threat visibility and detection. Lead incident response activities, ensuring swift containment and remediation of threats. đź“ŤThreat Hunting: Proactively hunt for threats across SaaS and cloud environments, identifying malicious behaviors or advanced persistent threats (APTs).Integrate Cyber Threat Intelligence (CTI) and OSINT into threat-hunting processes to anticipate and mitigate risks. đź“ŤSaaS and IAM Security: Manage and secure SaaS applications, including Google Workspace, and implement best practices for IAM systems like OKTA. Strenghten access policies, monitor user activity, and mitigate IAM-related security risks. đź“ŤBlockchain Collaboration: Work with the Donjon (Product Security Team) to provide operational support for blockchain-related risks, such as integrating relevant detection logic into SIEM or responding to specific blockchain-related incidents. This collaboration complements your primary responsibilities and allows you to engage with Web3 threats without being the primary owner of these risks.