Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

IBM Threat Hunter 
Hungary, Budapest 
3627559

09.09.2024
Why you’ll love your job:
You will join IBM Security Services which is a division of , responsible for delivering security services to its large global customers, alongside major digital transformation projects in the application and cloud domains. You will join a team of 20 + Security Analysts who are looking after to monitor, detect and respond to cyber threats. This is an excellent opportunity to learn and apply cybersecurity fundamentals using leading edge tools. Learn more about the SOC, Security Operations Centre . We look for motivated junior professionals who are keen to learn and grow.

You will be responsible for:
• Threat hunting and incident response activities in the customer environment using Azure /Microsoft Sentinel
• Demonstrating the ability to recognize attacks and attack patterns
• Deep analysis of threats
• Developing attack detection and playbooks
• Giving feedback to the analyst team on previous incidents
Required Technical and Professional Expertise

  • Minimum of 6 years of relevant job experience
  • Minimum of 2 years of experience in threat analysis & (technical) threat hunting
  • Knowledge and experience in analysis of various threat actor groups, attack patterns and tactics, techniques and procedures (TTPs), deep analysis of threats across the enterprise by combining security rules, content, policy and relevant datasets
  • Ability to recognize and research attacks and attack patterns
  • Demonstrable systems thinking and ability to clearly synthesize and communicate complex topics
  • Ability to collaborate in a virtual team and interface with multitude of stakeholders within or outside the SOC
  • Experience in creating clear & well-articulated documents /artefacts

Technical competence and skills:

  • Strong analytical, logical and problem-solving skills
  • Knowledge of cyber security threats, threat actors and their associated TTPs
  • Knowledge on OSI layers
  • Knowledge on Security Tools in Application, Data, Networks and Endpoint layers
  • Knowledge on malware-analysis and malware functionalities
  • Knowledge on native system and network policies
  • Knowledge on Query structures like Regular Expression, YARA and Snort rule, AQL and KQL types
  • Basic knowledge on scripting languages like Bash, Python and PowerShell, etc.
  • Knowledge of log formats for syslog, http logs, DB logs and how to gather forensics for traceability back to a security event
  • Experience with security devices such as SIEM, IDS/IPS, HIDS/HIPS, anomaly detection, Firewall, Antivirus systems, Endpoint Detection & Response tools and their log output
  • Experience in analyzing large data sets
  • Experience in using data mining, analytic and visualization tools, such as data lakes (Elastic, HDFS), Linux tools (ex. Grep, cut, sort) and regex
  • Experience with industrial taxonomies like Cyber Kill Chain, MiTRE’s ATT&CK, MiTRE’s CAPEC, MiTRE’s CAR, NIST, CIF, SANS and STIX 2.0
  • Strong communication skills both written and verbally
  • Ability to translate security impacts to the wider business
  • Ability to understand end-to-end threat landscape of all sectors
  • Skills to analyze attack vectors against a particular system to determine attack surface
  • Ability to produce contextual attack models applied to a scenario
  • Ability to demonstrate intrusion sets using cyber kill-chain and Tactics, Techniques and Procedures
  • Ability to co-ordinate with other security focal points during an active incident
  • Knowledge of security controls, how they can be monitored, and thwarted
  • Knowledge on vulnerability detection and response from Threat Hunting point of view
  • Network forensics: network traffic protocols, traffic analysis (i.e. Network flows and PCAP), intrusion detection

• Bachelor’s Degree in either of the disciplines: Computer Science, Automation, Electronics,
Electrical, Telecommunications, Computer Engineering
• Knowledge of either of SIEM tools – Sentinel, Qradar or Splunk
• Experience in one of the domains: Identity and Access, Data Security, Network & Endpoint Security,
Cloud Security, Security Operation Centre, etc.
• At least 1 year of professional working experience