Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailNot Disclosed
Salary Not Disclosed
Role Description:
Be someone who believes in continuous innovation is curious and relentless in finding a better way every day Develop and maintain a deep understanding of the latest threat landscape tactics techniques and procedures (TTPs) used by attackers Develop and maintain expertise in threat detection tools and technologies including SIEM systems EDR (endpoint detection and response) tools and network monitoring solutions
Be a part of a Purple Team to improve our security stance and implement your insights into rules Continuously evaluate and improve the effectiveness of existing threat detection and response measures
Competencies:
Cyber Security Digital : Digital Security
Experience (Years):
810
Essential Skills:
SIEM engineers with experience on log onboarding in elastic stack including parsing and normalizing data.
Passion drive and a belief in the value of cybersecurity operations as an enabler of business performance
Experience in development of cybersecurity attacks detection rules in complex corporate environments
The ability to communicate with a broad spectrum of stakeholders effectively from cybersecurity analysts to threat intelligence experts
A track record of successful delivery in penetration tests and red team exercises as an ethical hacker
A high level of integrity resultoriented approach and composure under pressure
Strong communication influencing and collaboration skills
Knowledge of detection rule development covering tools (such as SIEM EDRs) and industry frameworks (such as MITRE ATT&CK)
Desirable Skills:
Expert proficiency in Python Kusto or other scripting language
Experience working as a security analyst or incident responder (in a SOC/CSIRT/oncall setup) Experience with Azure security tooling and development within Azure Analysis of web traffic underlying malware lateral movement TTPs detected through Microsoft and Linux security events etc.
Logfile correlation and analysis Malware and exploit analysis (or reverse engineering)
Past collaboration with incident responders in developing detection rules and SOAR playbooks
Full Time