המקום בו המומחים והחברות הטובות ביותר נפגשים
Bachelor's degree in a relevant field or equivalent work experience. 3-4 years of experience in a SOC environment, with a focus on incident response, threat hunting, and forensics, specifically leveraging Microsoft Defender. Proficiency in using SIEM tools and other security technologies. Ability to track, analyze, and brief on new and ongoing cyber-attacks with understanding of identity and popular authentication/ authorization protocols. Experience using analysis tools (e.g. file/network/OS monitoring tools and/or debuggers) and knowledge of operating system internals and security mechanisms. Experience in XDR Technolgies MXDR (e.g. Microsoft Defender for XDR) Experience with reverse engineering, digital forensics (DFIR) or incident response, or machine learning models. Experience with offensive security including tools such as Metasploit, exploit development, Open Source Intelligence Gathering (OSINT), and designing ways to breach enterprise networks. Experience with advanced persistent threats and human adversary compromises. Strong understanding of attacker mindset and ability to apply defensive tactics to protect against it. Broad, general familiarity with the threat landscape affecting enterprise customers. Good verbal and written communication skills in English. Cyber security-based certifications such as CISSP, OSCP, CEH, or GIAC certifications.
משרות נוספות שיכולות לעניין אותך