Kogo szukamy?
What our client offers for you:
- Opportunity to work remotely.
- Developing in a multinational environment.
- Good opportunities to start a professional career with a global flavor leader.
- Flexible working time.
- Ability to learn and try new things.
- An environment where you will be given space to take ownership and accountability for your work.
Responsibilities:
- Coordinate an investigation, containment, and other response activities with business stakeholders and groups
- Develop and maintain effective documentation, including response playbooks, processes, and other supporting operational material.
- Provide mentoring of junior staff and serve as a point of escalation for higher severity incidents.
- Develop incident analysis and findings reports for management, including gap identification and recommendations for improvement.
- Recommend or develop new detection logic and tune existing sensors/security controls.
- Utilize various security tools, technologies, and software to monitor and protect the organization's systems and data.
- Collaborate with cross-functional teams, such as IT, engineering, and management, to ensure that security measures are integrated into all aspects of the organization's operations.
- Work with security solutions owners to assess existing security solutions array ability to detect/mitigate the abovementioned TTPs.
- Create custom SIEM queries and dashboards to support the monitoring and detection of advanced TTPs.
- Perform host-based analysis, artifact analysis, network packet analysis, and malware analysis in support of security investigations and incident response
Requirements:
- A bachelor's degree in computer science, information technology, cybersecurity, or a related field is often required.
- Good experience in IT Security Project Management.
- A strong understanding of computer systems, networks, and security technologies is essential.
- Good mediation and facilitation skills.
- Experience with security incident monitoring and response related to medical devices.
- Knowledge of (information) risk management-related standards or frameworks such as COSO, ISO 2700x, CobiT, ISO 24762, BS 25999, NIST, ISF Standard of Good Practice, and ITIL.
- Knowledge of security frameworks.