Secureworks® (NASDAQ: SCWX) a global cybersecurity leader, enables our customers and partners to outpace and outmaneuver adversaries with more precision, so they can rapidly adapt and respond to market forces to meet their business needs. With a unique combination of cloud-native, SaaS security platform and intelligence-driven security solutions, informed by 20+ years of threat intelligence and research, no other security platform is grounded and informed with this much real-world experience. www.secureworks.com
Role Overview
Role Responsibilities are as follows:
- Development of countermeasures to detect or block threats using cloud technologies:
- Explore new detection mechanisms
- Transform new and emerging threat research into actionable detection measures. Leveraging creative countermeasure development techniques and detection tooling.
- Cloud countermeasures
- Discover how a threat manifests in a Cloud environment and research how to detect that threat in Cloud telemetry and environment auditing.
- Network IDS/IPS countermeasures
- Analyze how a network enabled threat transmits data over the wire and research how to detect or block that threat with Snort or Suricata IDS/IPS rule creation.
- Contribute to the development and delivery of competitive services, methodologies, and deliverables in the security marketplace.
- Serve as a top subject matter expert in cloud technologies
- Work as an internal subject matter expert for other departments, including marketing, product management, and the broader Counter Threat Unit research team.
Requirements
- Minimum of 5 years of experience with public cloud vendor environments including AWS, Azure, Office 365, and GCP.
- Data Analysis and Programming
- Scripting PowerShell, Bash, Python and foundational programming skills.
- Hands on Experience with popular Python data science packages such as Numpy, Pandas, and Matplotlib.
- Familiarity with CI/CD pipelines, testing and automation.
- Forensic analysis of collected evidence artifacts
- Analysis of memory images from common OS types.
- Analysis of disk images that may involve various file systems (NTFS, FAT, EXT, HFS+...) and operating systems.
- Network traffic analysis
- Identifying detectable traits of threat network traffic.
- Broad analysis of traffic patterns to identify anomalies.
- Event log analysis
- Inspection of log data from common operating systems and security infrastructure to identify threat activity and piece together an incident.
- Analysis of log data from security infrastructure (firewalls, web proxy etc.) to identify anomalous patterns of behavior.
Education, Experience & Credentials
Typically requires 8+ years of related experience in a professional role with a Bachelor’s degree; or 6+ years with a Master’s degree; or 3+ years with a PhD; or equivalent experience
GSEC, GCIA, GPEN, GWAPT, GCIH, GSEC, OSCP, OSCE, or equivalent certifications
Preferences
- Performing analysis of security and infrastructure logs using modern data analysis strategies.
- Researching targeted threat groups and their tactics, techniques, and procedures (TTP).
- Experience in developing tools for malicious code analysis, network traffic analysis and the detection of malicious code on endpoint systems is a strong plus.
- Performing vulnerability and exploit research and analysis.
- Strong understanding of computer architecture and operating systems concepts.
- Experience working with version control systems, issue tracking tools, and CI/CD systems.
- Experience with deployment automation tools and techniques, including Packer, Vagrant, Terraform, Ansible, AWS CloudFormation, and Azure Resource Manager.
- Thorough knowledge of information security components, principles, practices, and procedures.
- Thorough understanding of computer network exploitation (CNE) and computer network defense (CND) concepts.
- Ability to articulate and present findings to broader audiences in a clear manner.