We are looking for an experienced Incident Responder.
We seek a subject matter expert in cyber-IR, threat hunting and forensic investigations, to join us in our journey to build and provide an innovative cybersecurity solution to the market.
In this role, you will be involved with incident response investigations & threat hunting efforts in the cloud. You will also help design and improve cloud incident response and threat hunting methodologies, processes and technological capabilities. You will have a versatile set of skills, deep knowledge, and strong learning capabilities.
What youll do:
Utilize technology to conduct large-scale incident response and proactive assessments, such as threat hunting
Research cyberattacks tactics and techniques to codify for existing and future customers
Conduct host forensics, log analysis, and triage in support of investigations
Provide briefings, status updates and advice, to a variety of audiences, including technical and executive leadership teams
Cooperate with Research & Development to enhance our IR capabilities
Collaborate and work with customer teams such as IT, DevOps, and Security in the customer journey
Publication and presentation of research projects in the worldwide cyber security community
We seek a subject matter expert in cyber-IR, threat hunting and forensic investigations, to join us in our journey to build and provide an innovative cybersecurity solution to the market.
In this role, you will be involved with incident response investigations & threat hunting efforts in the cloud. You will also help design and improve cloud incident response and threat hunting methodologies, processes and technological capabilities. You will have a versatile set of skills, deep knowledge, and strong learning capabilities.
What youll do:
Utilize technology to conduct large-scale incident response and proactive assessments, such as threat hunting
Research cyberattacks tactics and techniques to codify for existing and future customers
Conduct host forensics, log analysis, and triage in support of investigations
Provide briefings, status updates and advice, to a variety of audiences, including technical and executive leadership teams
Cooperate with Research & Development to enhance our IR capabilities
Collaborate and work with customer teams such as IT, DevOps, and Security in the customer journey
Publication and presentation of research projects in the worldwide cyber security community
Requirements:
You have 3 years of experience in incident response, security operations, threat hunting, or similar
You have experience with scripting languages, such as Python
You possess a deep knowledge of computer network architecture and protocols
You understand operating systems internals (e.g., Windows and Unix)
You understand cyber security concepts and terminology – attack vectors, malware families and campaigns
You are a team player with a passion for cyber security trends and innovation; independent and capable of adapting in a constantly changing environment.
It would also be nice if you had:
Experience in cloud security
Thorough knowledge of additional programming languages (e.g., Go; Java; C/C++)
Red Team, penetration testing, or cyber operations background
Knowledge of commercial attack frameworks (e.g., Canvas; Metasploit; Cobalt Strike)
Experience in host forensics investigation (e.g., dead disk forensics, memory forensics, live system analysis)
Malware analysis background
You have 3 years of experience in incident response, security operations, threat hunting, or similar
You have experience with scripting languages, such as Python
You possess a deep knowledge of computer network architecture and protocols
You understand operating systems internals (e.g., Windows and Unix)
You understand cyber security concepts and terminology – attack vectors, malware families and campaigns
You are a team player with a passion for cyber security trends and innovation; independent and capable of adapting in a constantly changing environment.
It would also be nice if you had:
Experience in cloud security
Thorough knowledge of additional programming languages (e.g., Go; Java; C/C++)
Red Team, penetration testing, or cyber operations background
Knowledge of commercial attack frameworks (e.g., Canvas; Metasploit; Cobalt Strike)
Experience in host forensics investigation (e.g., dead disk forensics, memory forensics, live system analysis)
Malware analysis background
This position is open to all candidates.