Checking job availability...
Original
Simplified
- Proactively identify and respond to cyber threats
- Implement and ensure appropriate standards
- Mentor team members
- Craft detection content
- Prioritize triage events
- Improve existing detection content and playbooks
- Ensure in-time incident response
- Perform on-duty/ on- call support
- Handle major security incidents
- Understand the environment and applications
- Analyse and document incidents
- 3+ years or work experience in cyber security as an analyst or incident responder (in a SOC/CSIRT setup, preferably)
- In-depth knowledge of current threat landscape, offensive tooling, and OWASP and MITRE ATT&CK techniques
- Technical writing skills to present complex topics to non-technical audiences
- Excellent oral and written communication skills (English)
- Malware and exploit analysis (or reverse engineering)
- This position may require participation in on-call rotations to address urgent matters outside of regular working hours.
- Developing hypothesis-driven threat hunts
- Analysing various events, including but not limited to web traffic, underlying network protocols, malware, lateral movement TTPs (techniques, tactics, and procedures), or Microsoft and Linux security events
- Logfile correlation and analysis
- System and memory analysis
- Chain of custody and forensic acquisitions
- Major incident response or breach investigation management
- Experience developing in Python, Kusto, or any other scripting language (desirable)
- Experience with Azure or Amazon AWS (desirable)
Reference Code: 132867
- Proactively identify and respond to cyber threats
- Implement and ensure appropriate standards
- Mentor team members
- Craft detection content
- Prioritize triage events
- Improve existing detection content and playbooks
- Ensure in-time incident response
- Perform on-duty/ on- call support
- Handle major security incidents
- Understand the environment and applications
- Analyse and document incidents
- 3+ years or work experience in cyber security as an analyst or incident responder (in a SOC/CSIRT setup, preferably)
- In-depth knowledge of current threat landscape, offensive tooling, and OWASP and MITRE ATT&CK® techniques
- Technical writing skills to present complex topics to non-technical audiences
- Excellent oral and written communication skills (English)
- Malware and exploit analysis (or reverse engineering)
- This position may require participation in on-call rotations to address urgent matters outside of regular working hours.
- Developing hypothesis-driven threat hunts
- Analysing various events, including but not limited to web traffic, underlying network protocols, malware, lateral movement TTPs (techniques, tactics, and procedures), or Microsoft and Linux security events
- Logfile correlation and analysis
- System and memory analysis
- Chain of custody and forensic acquisitions
- Major incident response or breach investigation management
- Experience developing in Python, Kusto, or any other scripting language (desirable)
- Experience with Azure or Amazon AWS (desirable)
Reference Code: 132867