More jobs:
Job Description & How to Apply Below
Overview
To provide hunts in customer environment in order to identify any threat and report it to the client within the agreed SLA. Ability to handle high-pressure and complex situations. Analyze complex data to identify vulnerabilities and potential threats and provide reports timeously. This specific roles will leverage Operational Technologies Tools and Logs.
Responsibilities- Exploration and integration of new cybersecurity testing tools, processes, and capabilities.
- Contribute to the tuning and development of SIEM use cases and other security control configurations to enhance threat detection capabilities.
- Hands‑on, collaborative cybersecurity testing of critical SOC environments, applications, systems, etc.
- Discover and analyze vulnerabilities.
- Continuously improve processes for use across multiple detection sets for more efficient operations.
- Perform in‑depth investigation of events of interest identified during threat hunt activities or security alerts received from various security technologies. Liaise with appropriate internal stakeholders during the investigation process to determine whether a security incident has occurred, identify the root cause and provide appropriate recommendations for remediation.
- Network and system integrity testing (i.e., searching for possible unauthorized behavior/signs of compromise).
- Proactively 'hunt' for potential malicious activity and incidents across multiple customers using advanced threat network and host‑based tools.
- Identify and perform escalations to the Security Incident Response team.
- Provide support in the detection, response, mitigation, and reporting of cyber threats affecting client networks with the ability to evaluate IT environments and identify security goals, objectives, and requirements.
- Maintain and employ a strong understanding of advanced threats, continuous vulnerability assessment, response and mitigation strategies used in Cybersecurity operations.
- Perform risk analysis, attack simulation, application‑level automated & manual Ethical Hacking and develop proof‑of‑concept exploits.
- Motivating and empowering the team.
- Active involvement in management discussions.
- Excellent interpersonal, presentation, and facilitation skills.
- Self‑motivated, curious, and knowledgeable about information security news and current events.
- Able to work independently.
- Ability to build relationships and interact effectively with internal and external parties.
- Good analytical, technical, written, and verbal communication skills.
- Ability to multi‑task in a fast‑paced and demanding work environment.
- Comfortable with a high‑tech work environment and constantly learning new tools and innovations.
- Good working knowledge of Office tools.
- Knowledge of OT Environments, Systems and Networks.
Skills / Certifications
- Any related cybersecurity certifications is a plus.
- Any related SANS OT, IEC/ISA, or OT certifications is a plus.
- Overall 8+ years’ experience working in a large‑scale IT environment focusing on Information Security.
- Minimum 5 years’ experience as Threat Hunter.
Bachelor's degree in Computer Science or Information Technology (Any area).
Seniority levelMid‑Senior level
Employment typeFull‑time
Job functionGeneral Business, Management, and Business Development
IndustriesComputer and Network Security
Referrals increase your chances of interviewing at CPX by 2x.
Apply BELOW
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×