let’s make something together

Give us a call or drop by anytime, we endeavour to answer all enquiries within 24 hours on business days.

Find us

PO Box 16122 Collins Street West
Victoria 8007 Australia

Email us

info@domain.com
example@domain.com

Phone support

Phone: + (066) 0760 0260
+ (057) 0760 0560

Lead Analyst (Cybersecurity Operations)

  • By Weronika Drwila
  • 28 August 2023
  • 177 Views

Technologies we use

Expected

  • Oracle

  • Citrix

  • iOS

.

Operating system

  • Windows
  • Linux

.

About the project

We have a unique opportunity for you to join our team! The Cybersecurity Monitoring and Threat Detection Team are charged with efficiently and effectively monitoring the client global technology and information estate 24×7. The team’s mission is to detect the presence of any adversary within the estate, quickly analyse the severity and scope of the issue and work with the Cybersecurity Incident Management and Response Team to contain, mitigate and remediate the incursion. In addition, the team is responsible for constantly improving its detection capability through attack analysis and ensuring that the appropriate security event information is being fed into the team and that the alerting rules are tuned for maximum effectiveness. This mission is critical to the protection of customers, the brand, shareholder value, as well as information and financial assets.

.

Lead Analysts are responsible for leading the analysis of and supporting the response to cyber security events within client’s, using the latest threat monitoring and detection technologies to detect, analyse and respond.

.

Your responsibilities

  • Work as a senior member of the Monitoring and Threat Detection team within an “Analysis POD” tasked with triage of threat detection events from across the entire global technology estate.

  • Collaborate with colleagues across Threat Detection and Incident Management areas to ensure a rapid and focussed identification and escalation of potential threat events.

  • Provide support into Incident Response actions, providing SME knowledge to ensure continuity and depth of investigation.

  • Involvement in “Purple Team” and Threat Simulation activities, ensuring that the detection capability is accurately assessed and validated.

  • Collaborate with the Threat Hunters on hypothesis driven threat hunt and advanced data analysis.

  • Apply structured analytical techniques and critical thinking to ensure consistent triage of threat events.

  • Contribute to Post-Incident reviews, ensuring that output is captured and use to continually improve detection posture.

  • Provide quality assurance and oversight to investigation tickets, ensuring that ideas for improvement and training are captured in an objective manner.

  • Support the Crew Lead during shift handovers, ensuring the effective operations 24x7x365.

  • Provide expert-level advice and technical leadership to the team, driving the continued evolution of hunting, monitoring, detection, analysis and response capabilities and processes.

  • Train, develop, mentor and inspire cybersecurity colleagues in area(s) of specialism.

  • Review technical threat intelligence reports and apply detailed analysis of Indicators of Attack to ensure that we are able to defend against similar threats.

  • Identifying new SIEM detection use cases, taking end-to-end ownership of the delivery including testing, triage documentation and training requirements.

  • Identify processes that can be automated and orchestrated to ensure maximum efficiency of Global Cybersecurity Operations resources, reducing manual repetitive tasks where possible.

.

Our requirements

  • Excellent investigative skills, insatiable curiosity and an innate drive to win.

  • Instinctive and creative, with an ability to think like the enemy.

  • Strong problem-solving and trouble-shooting skills.

  • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one.

  • An understanding of business needs and commitment to delivering high-quality, prompt and efficient service to the business.

  • An understanding of organisational mission, values and goals and consistent application of this knowledge.

  • Self-motivated and possessing of a high sense of urgency and personal integrity.

  • Highest ethical standards and values.

  • Experience defining and refining operational procedures, workflows and processes to support the team in consistent, quality execution of monitoring and detection.

  • Good understanding of cyber security principles, global financial services business models, regional compliance regulations and laws.

  • Good understanding and knowledge of common industry cyber security frameworks, standards and methodologies, including; MITRE ATT&CK, OWASP, ISO2700x series, PCI DSS, GLBA, EU data security and privacy acts, FFIEC guidelines, CIS and NIST standards.

  • Good communication and interpersonal skills with the ability to produce clear and concise reports for targeted audiences across internal and external stakeholders.

  • Ability to speak, read and write in English, in addition to your local language.

  • Technical expertise in analysing threat event data, evaluating malicious activity, documenting unusual files and data and identifying tactics, techniques and procedures used by attackers.

  • Expert level knowledge and demonstrated experience in analysis and dissection of advanced attacker tactics, techniques and procedures in order to inform adjustments to the control plane.

  • Expert level of knowledge and demonstrated experience of common Security Information and Event Management (SIEM) platforms for the collection and real-time analysis of security information.

  • Expert level knowledge of Enterprise Detect and Response (EDR) tooling for the identification, prevention and detection of cyber-threats and for use in triage, investigation and threat hunting.

  • Detailed knowledge and demonstrated experience of common cybersecurity technologies such as; IDS / IPS / HIPS, Advanced Anti-malware prevention and analysis, Firewalls, Proxies, MSS, etc.

  • Excellent knowledge and demonstrated experience of common operating systems and end user platforms to include Windows, Linux, Citrix, ESX, OSX, etc.

  • Excellent knowledge of common network protocols such as TCP, UDP, DNS, DHCP, IPSEC, HTTP, etc. and network protocol analysis suits.

  • Good knowledge and demonstrated experience in incident response tools, techniques and process for effective threat containment, mitigation and remediation.

  • Functional knowledge of scripting, programming and/or development of bespoke tooling or solutions to solve unique problems.

  • Functional knowledge of Security Orchestration Automation and Response (SOAR) platforms including development and implementation of automation routines.

  • Functional knowledge and technical experience of cloud computing platforms such as AWS, Azure and Google.

  • Basic knowledge and demonstrated experience in common cybersecurity incident response and forensic investigation tools such as: EnCase, FTK, Sleuthkit, Kali Linux, IDA Pro, etc.

.

What we offer

  • Competitive salary

  • Annual performance-based bonus

  • Additional bonuses for recognition awards

  • Multisport card

  • Private medical care

  • Life insurance

  • One-time reimbursement of home office set-up (up to 800 PLN)

  • Corporate parties & events

  • CSR initiatives

  • Nursery and kindergarten discounts

  • Language classes

  • Financial support with trainings and education

  • Social fund

  • Flexible working hours

  • Free parking

.

Benefits

  • sharing the costs of sports activities

  • private medical care

  • sharing the costs of foreign language classes

  • sharing the costs of professional training & courses

  • life insurance

  • remote work opportunities

  • flexible working time

  • integration events

  • corporate sports team

  • doctor’s duty hours in the office

  • retirement pension plan

  • corporate library

  • no dress code

  • video games at work

  • coffee / tea

  • parking space for employees

  • leisure zone

  • extra social benefits

  • employee referral program

  • opportunity to obtain permits and licenses

  • charity initiatives

  • family picnics

  • extra leave

    .

Dotcommunity jest zarejestrowana w Rejestrze agencji zatrudnienia (KRAZ) pod numerem 9904.

    *-required