Expected
- SOC
- SIEM
- Windows / Linux / Citrix / ESX / OSX
- cybersecurity
- security
- MITRE framework (basics)
Company
.
About the project
We have a unique opportunity for you to join The Cybersecurity Monitoring and Threat Detection Team! They are charged with efficiently and effectively monitoring the client’s global technology and information. The team’s mission is to detect the presence of any adversary within the estate, quickly analyse the severity and scope of the issue and work with the Cybersecurity Incident Management and Response Team to contain, mitigate and remediate the incursion. In addition, the team is responsible for constantly improving its detection capability through attack analysis and ensuring that the appropriate security event information is being fed into the team and that the alerting rules are tuned for maximum effectiveness. This mission is critical to the protection of customers, the brand, shareholder value, as well as information and financial assets..
Lead Analysts are responsible for leading the analysis of and supporting the response to cyber security events within the client’s company, using the latest threat monitoring and detection technologies to detect, analyse and respond.
.
Your responsibilities
-
Work as a senior member of the Monitoring and Threat Detection team within an “Analysis POD” tasked with triage of threat detection events from across the entire global technology estate.
-
Collaborate with colleagues across Threat Detection and Incident Management areas to ensure a rapid and focussed identification and escalation of potential threat events.
-
Provide support into Incident Response actions, providing SME knowledge to ensure continuity and depth of investigation.
-
Involvement in “Purple Team” and Threat Simulation activities, ensuring that the detection capability is accurately assessed and validated.
-
Collaborate with the Threat Hunters on hypothesis driven threat hunt and advanced data analysis.
-
Apply structured analytical techniques and critical thinking to ensure consistent triage of threat events.
-
Contribute to Post-Incident reviews, ensuring that output is captured and use to continually improve detection posture.
-
Provide quality assurance and oversight to investigation tickets, ensuring that ideas for improvement and training are captured in an objective manner.
-
Support the Crew Lead during shift handovers, ensuring the effective operations.
-
Provide expert-level advice and technical leadership to the team, driving the continued evolution of hunting, monitoring, detection, analysis and response capabilities and processes.
-
Train, develop, mentor and inspire cybersecurity colleagues in area(s) of specialism.
-
Review technical threat intelligence reports and apply detailed analysis of Indicators of Attack to ensure that the company is able to defend against similar threats.
-
Identifying new SIEM detection use cases, taking end-to-end ownership of the delivery including testing, triage documentation and training requirements.
-
Identify processes that can be automated and orchestrated to ensure maximum efficiency of Global Cybersecurity Operations resources, reducing manual repetitive tasks where possible.
.
Their requirements
- 5+ years of experience in cyber security senior analyst role or similar.
- Experience within an enterprise scale organisation; including hands-on experience of complex data centre environments, preferably in the finance or similarly regulated sector.
- Industry recognised cyber security related certifications including; CEH, OSCP, EnCE, SANS GSEC, GCIH, GCIA, and/or CISSP.
- Technical expertise in analysing threat event data, evaluating malicious activity, documenting unusual files and data and identifying tactics, techniques and procedures used by attackers.
- Expert level knowledge and demonstrated experience in analysis and dissection of advanced attacker tactics, techniques and procedures in order to inform adjustments to the control plane.
- Expert level of knowledge and demonstrated experience of common Security Information and Event Management (SIEM) platforms for the collection and real-time analysis of security information.
- Expert level knowledge of Enterprise Detect and Response (EDR) tooling for the identification, prevention and detection of cyber-threats and for use in triage, investigation and threat hunting.
- Detailed knowledge and demonstrated experience of common cybersecurity technologies such as; IDS / IPS / HIPS, Advanced Anti-malware prevention and analysis, Firewalls, Proxies, MSS, etc.
- Excellent knowledge and demonstrated experience of common operating systems and end user platforms to include Windows, Linux, Citrix, ESX, OSX, etc.
- Excellent knowledge of common network protocols such as TCP, UDP, DNS, DHCP, IPSEC, HTTP, etc. and network protocol analysis suits.
- Good knowledge and demonstrated experience in incident response tools, techniques and process for effective threat containment, mitigation and remediation.
- Functional knowledge of scripting, programming and/or development of bespoke tooling or solutions to solve unique problems.
- Functional knowledge of Security Orchestration Automation and Response (SOAR) platforms including development and implementation of automation routines.
- Functional knowledge and technical experience of cloud computing platforms such as AWS, Azure and Google.
- Basic knowledge and demonstrated experience in common cybersecurity incident response and forensic investigation tools such as: EnCase, FTK, Sleuthkit, Kali Linux, IDA Pro, etc.
- Formal education and advanced degree in Information Security, Cyber-security, Computer Science or similar and/or commensurate demonstrated work experience in the same.
- Good understanding and knowledge of common industry cyber security frameworks, standards and methodologies, including; MITRE ATT&CK, OWASP, ISO2700x series, PCI DSS, GLBA, EU data security and privacy acts, FFIEC guidelines, CIS and NIST standards.
.
What they offer
-
Annual performance-based bonus
-
Additional bonuses for recognition awards
-
Multisport card
-
Private medical care
-
Life insurance
-
One-time reimbursement of home office set-up (up to 800 PLN) and more
-
Corporate parties & events
-
CSR initiatives
-
Nursery and kindergarten discounts
-
Language classes
-
Professional training & courses
-
Financial support with trainings and education
-
Free parking
- Corporate library, video games.
.
Note: Prepare your CV in English (PDF), fill in the form and apply!
Please include in your CV the following clause necessary for the recruitment process:
I agree to the processing of personal data that I have made available voluntarily in the recruitment process by the Administrator of personal data, i.e. Dotcommunity Spółka z ograniczoną odpowiedzialnością [Ltd.] based in Cracow, 15 Żabiniec Street, 31-215 Cracow, registered in Poland, the Cracow’s District Court – Śródmieście, XI Commercial Division of the National Court Register under number 0000468484, VAT number: 9452174499, (“Dotcommunity”) in order to carry out the recruitment process for the Lead Analyst (Cybersecurity Operations) position on the basis of Art.6 item 1a of the Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation)
Dotcommunity is registered in the Register of Employment Agencies (KRAZ) under number 9904.