Search by job, company or skills

R

Cyber Security Engineer

new job description bg glownew job description bg glownew job description bg svg
  • Posted 4 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

To be part of Cyber Threat team, tier 3 SME and mentor to the SOC team. This role required continuous detection, analysis, investigation, response, and mitigation of advanced threats before they affected the bank's IT infrastructure via a proven and documented cyberthreat model, e.g., Mitre Attack Framework

Preferred Level Of Experience (by Years/function/industry)

  • 4 - 5 years of information security experience
  • 1 - 2 years supporting incident response and/or investigations
  • Experience reviewing and assessing logs for anomalous activity indicating the presence of a threat
  • Knowledge and ability to identify threat actor attack methods and track their developments
  • Experience using Threat Model e.g. Cyber Kill Chain & Mitre ATT&CK
  • Extensive experience conveying complex information in simple, succinct explanations
  • Exceptional attention to detail

Other Skills Required (if Applicable)

  • Strong technical writing skills
  • Extensive experience with analytical tradecraft
  • Thorough understanding of cybersecurity principles
  • Ability to work independently and build relationships
  • Efficient research methodologies
  • Ability to relate & convert technical threats with business risks
  • Strong proficiency with scripting and programming languages (e. g. Python, PowerShell, Java, NodeJS, Perl, etc).
  • Strong communication & writing skills for reporting and analysis on cumulative findings

KEY RESPONSIBLITIES

Solution

  • Maintaining of SIEM solution including Splunk, Imperva and etc. (Task including compliance to patch and obsolescence framework requirement)
  • Ensure events / logs from all relevant devices are sending to SIEM solution in a complete and accurate manner
  • To produce monthly SIEM system health report (completeness and accurate)

Hunting

  • Perform threat hunting through industry accepted methodologies including Hypothesis Driven investigation, IOC driven Investigation or Machin Leaning Investigation
  • Analyze host, network traffic, IDS/IPS/DLP events, packet capture, firewall logs and other relevant solutions
  • Provide forensic analysis of network packet captures, DNS, proxy, Netflow, malware, host-based security and application logs, as well as logs from various types of security sensors
  • Identify gaps in IT infrastructure by mimicking an attacker s behaviors and responses
  • Perform offensive validation on identified TTP's

Detection & Response

  • Continuously develop SIEM use cases based on Mitre Attack framework based on threat landscape
  • To onboard all use cases to Security Operation Center for 24 x 7 monitoring and timely response
  • Continuously onboard new IOC to threat prevention solution to ensure known threat are prevented at all time
  • Continuously improve processes for use across multiple detection sets for more efficient Security Operations
  • Develop dashboards and reports to identify potential threats, suspicious/anomalous activity, malware, etc.
  • Assist in the design, evaluation, and implementation of new security technologies

More Info

Job Type:
Industry:
Employment Type:

About Company

Job ID: 145215469