Regular or Temporary:
English (Required)
1st shift (United States of America)The Cyber Hunt & Respond Senior Engineer is an advanced, after-hours role within the 24/7 Cyber Fusion Center. This role has 2 core functions, proactive Threat Hunting & reactive Incident Response coverage.
Essential Duties and Responsibilities
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
1. As Digital Forensics & Incident Response (DFIR) professionals, individuals in this role must be well-versed in log, packet, network, endpoint, root cause analysis, containment, and eradication.
2. A programming, computer science, or data science background will be important to success in this role as unstructured data will need automated decisions made and other data reduction techniques applied. Depending on the candidate, the role will likely start with basic searches and visualizations but may lead to pioneering use of Machine Learning and Artificial Intelligence techniques and tools. Familiarity with programming and malicious code critical to success in this role.
4. The Cyber Hunt & Respond Senior Engineer is responsible for conducting presentations and mentoring others interested or responsible for related data science, threat hunting, or incident response.
Required Qualifications:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
1. Bachelor’s degree in Computer Science, Computer Engineering, Cybersecurity, or related field of relevant education, certification, or related training.
2. 8 years of experience in Cybersecurity or related work
3. Knowledge of one or more cloud platforms and cloud security
4. Knowledge of general information technology (IT) and cybersecurity
5. Knowledge of computer networking concepts and protocols, and network security methodologies.
6. Knowledge of network traffic analysis and packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).
7. Knowledge of operating systems, including Windows/Unix ports and services.
8. Knowledge of modern identity and access management concepts
9. Knowledge of phishing tactics and techniques
10. Knowledge of advanced cyber threats and vulnerabilities.
11. Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
12. Knowledge of adversarial tactics, techniques, and procedures
13. Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.
14. Knowledge of incident response and handling methodologies.
15. Knowledge of countermeasures to address a variety of threats
16. Knowledge around leveraging automation, ML, and/or AI
17. Knowledge of advanced threat hunting techniques
18. Knowledge of types of digital forensics data and how to recognize them.
19. Knowledge of types and collection of persistent data.
20. Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]).
21. Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files.
22. Knowledge of processes for seizing and preserving digital evidence.
Preferred Qualifications:
1. Experience working in cloud environments, namely Microsoft Azure and Amazon AWS.
2. Industry certifications in general technology (e.g. Network+, AWS Certified Cloud Practitioner, Microsoft Azure Fundamentals, etc.)
3. Industry certifications in cyber security, such as: Security+, CySA+, GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Examiner (GCFE), GIAC Cloud Forensics Responder (GCFR), GIAC Certified Forensic Analyst (GCFA), GIAC Network Forensic Analyst (GNFA), GIAC Reverse Engineering Malware Certification (GREM), etc.
4. Experience in Cyber Breach Response, Security Operations Center (SOC), Network Operations Center (NOC), IT/Cyber Engineering, or Intelligence Community (IC)
משרות נוספות שיכולות לעניין אותך