HIDS / HIPS (regular)
SIEM (advanced)
Security tools (advanced)
data mining (advanced)
Threat hunting (master)
To prevent. To out think threats. Not just to do something better, but to attempt what some would consider impossible. To lead in this new landscape of security technology and solve some of the world’s most challenging security problems.
Your Role and Responsibilities :
Threat Hunting using various toolsets, based on intelligence gathered
Ability to recognize and research attacks and attack patterns
Knowledge and experience in analysis of various threat actor groups, attack patterns and tactics, techniques, and procedures (TTPs), deep analysis of threats across the enterprise by combining security rules, content, policy and relevant datasets
Develop attack detection & response playbooks, counter-measure definition and strategies to mitigate emerging threats
Conduct cyber threat modelling to improve threat detection & mitigation
Demonstrable systems thinking and ability to clearly synthesize and communicate complex topics
Ability to collaborate in a virtual team and interface with multitude of stakeholders within or outside the SOC.
Skills required :
Experience with security devices such as SIEM, IDS / IPS, HIDS / HIPS, anomaly detection, Firewall, Antivirus systems, Endpoint Detection & Response tools and their log output
Experience in analyzing large data sets
Experience in using data mining, analytic and visualization tools, such as data lakes (Elastic, HDFS), Linux tools (ex.
Grep, cut, sort) and regex
Experience with industrial taxonomies like Cyber Kill Chain, MiTRE’s ATT&CK, MiTRE’s CAPEC, MiTRE’s CAR, NIST, CIF, SANS and STIX 2.0
Strong communication skills both written and verbally
Ability to translate security impacts to the wider business
Ability to understand end-to-end threat landscape of all sectors
Skills to analyze attack vectors against a particular system to determine attack surface
Ability to produce contextual attack models applied to a scenario
Ability to demonstrate intrusion sets using cyber kill-chain and Tactics, Techniques and Procedures
Ability to co-ordinate with other security focal point during an active incident
Knowledge of security controls, how they can be monitored, and thwarted
Knowledge on vulnerability detection and response from Threat Hunting point of view
Network forensics : network traffic protocols, traffic analysis (i.e. Network flows and PCAP), intrusion detection
Required Technical and Professional Expertise :
Analytical, logical and Problem-Solving Skills
Knowledge of cyber security threats, threat actors and their associated TTPs
Knowledge on OSI layers
Knowledge on Security Tools in Application, Data, Networks and Endpoint layers
Knowledge on malware-analysis and malware functionalities
Knowledge on native system and network policies
Knowledge on Query structures like Regular Expression, YARA and Snort rule, AQL and KQL types
Basic knowledge on scripting languages like Bash, Python and PowerShell, etc
Knowledge of log formats for syslog, http logs, DB logs and how to gather forensics for traceability back to a security event
Preferred Technical and Professional Expertise
Takes an active part in the gathering, analysis, and communication of threat intelligence through the intelligence process
Provide intelligence briefings to other areas of the business on threats or threat actors and the risk they bring to the environment
Coordinates the planning, development and production of communication materials using various communication vehicles
Interface with Security Operational Center (SOC) management and related internal groups for review, production, and dissemination of content
Offer :
Cooperation via Experis
Many development opportunities and access to modern technology
Medicover
Multisport Card
Life insurance and many more