Job Description :
Job Description: Roles, responsibilities:
• Understanding of the threat landscape in terms of the tools, tactics, and techniques of attacks, as well as networking and security fundamentals
• Developed documentation such process flows and SOPs
• Experience in the gathering, analysis and usage of threat intelligence from commercial and open source sources
• Experience in Cyber Kill Chain, MiTRE’s ATT&CK framework
• Knowledge of the Splunk search language, search techniques, alerts, dashboards, and report building
• Perform the full threat hunting cycle, including the development of EDR detection rules
• Developing automation and orchestration use cases in a SOAR (Security Orchestration and Automation Response)
• Analyze large and unstructured data sets to identify trends and anomalies indicative of malicious activities
• Relevant experience: 5 – 8 years
Key Skills: Roles, responsibilities:
• Understanding of the threat landscape in terms of the tools, tactics, and techniques of attacks, as well as networking and security fundamentals
• Developed documentation such process flows and SOPs
• Experience in the gathering, analysis and usage of threat intelligence from commercial and open source sources
• Experience in Cyber Kill Chain, MiTRE’s ATT&CK framework
• Knowledge of the Splunk search language, search techniques, alerts, dashboards, and report building
• Perform the full threat hunting cycle, including the development of EDR detection rules
• Developing automation and orchestration use cases in a SOAR (Security Orchestration and Automation Response)
• Analyze large and unstructured data sets to identify trends and anomalies indicative of malicious activities
• Relevant experience: 5 – 8 years


Source link