Search by job, company or skills

R

Section Head, Threat Detection, Hunting & Response

new job description bg glownew job description bg glownew job description bg svg
  • Posted 3 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Technical leader responsible for spearheading the bank's threat detection, hunting, and digital forensics capabilities.

Leadership & Strategy

  • Define and execute the strategic roadmap for threat intel, hunting, and incident response
  • Build, lead, and mentor a high-performing threat hunters
  • Establish and continuously improve detection and response capabilities, processes, and tooling.
  • Develop key performance indicators (KPIs) and metrics to measure detection effectiveness, response times, and threat coverage.
  • Foster a collaborative purple team culture between defensive and offensive security teams to improve detection and resilience.

Threat Intelligence Operations

  • Collect, analyze, and correlate data from multiple intelligence sources (open source, commercial, and internal).
  • Identify, track, and report on threat actors, campaigns, and emerging threats relevant to the organization's industry.
  • Develop and maintain comprehensive threat profiles and intelligence reports.
  • Monitor the dark web, social media, and underground forums for indicators of potential threats and geopolitical, criminal, and hacktivist developments that may affect organizational risk.
  • Track emerging vulnerabilities, exploit kits, and malware families relevant to the industry and geopolitical.
  • Maintain awareness of evolving adversary capabilities and motivations.

Solution Engineering

  • Maintaining of SIEM solution including Splunk, Imperva and etc. (Task including compliance to patch and obsolescence framework requirement)
  • Ensure events / logs from all relavant devices are sending to SIEM solution in a complete and accurate manner
  • To produce monthly SIEM system health report (completeness and accurate)
  • Assist in the design, evaluation, and implementation of new security technologies

Proactive Threat Hunting

  • Perform hypothesis-driven threat hunts using advanced analytics, behavioral patterns, and threat intelligence.
  • Analyze various logs sources to identify anomalous activities, potential compromises, and previously undetected threats
  • Develop and refine hunting methodologies and detection logic to improve visibility and coverage
  • Identify gaps in IT infrastructure by mimicking an attacker s behaviors and responses
  • Document and communicate hunting results, including risk impact and recommended mitigations.

Detection & Response

  • Continuously develop, finetune and review SIEM use cases based on Mitre Attack framework and current threat landscape
  • Contribute to the continuous improvement of detection capabilities and automation processes.
  • Correlate data from multiple sources (network logs, endpoint telemetry, cloud environments) to detect stealthy or novel attacks.
  • Develop dashboards and reports to identify potential threats, suspicious/anomalous activity, internal threat landscape, etc.
  • Integrate intelligence indicators (IOCs, TTPs) into detection tools including SIEM, EDR/XDR, WAF, IDS/IPS and other relevant solution

Digital Forensic

  • Lead response and investigation efforts into advanced/targeted attacks
  • Lead in incident response activities such as digital forensic, host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts
  • Compile detailed investigation and analysis reports for internal SOC consumption and delivery to management
  • Provide expert analytic investigative support of large scale and complex security incidents
  • Perform Root Cause Analysis of security incidents for further enhancement of alert catalog

Incident Response

  • Lead or support security incident investigations from detection through containment, eradication and recovery
  • Perform deep-dive and forensics analysis during ongoing or post-incident reviews.
  • Develop post-incident reports and lessons learned to drive improvements in detection and response capabilities

Research and Continuous Improvement

  • Stay up to date with emerging threats, attacker behaviors, and cybersecurity trends.
  • Develop and maintain custom scripts and tools to automate hunting and analysis tasks (e.g., Python, PowerShell, or Bash).
  • Knowledge sharing through internal training sessions and threat briefings.
  • Drive continuous improvement in intelligence collection, analysis, and dissemination processes.
  • Mentor analysts and engineers on threat analysis methodologies
  • Participate in security audits and vendor assessments.

More Info

Job Type:
Industry:
Function:
Employment Type:

About Company

Job ID: 145215439