Kogo szukamy?
What our client offers you:
- Opportunity to work remotely.
- Developing in a multinational environment.
- Good opportunities to start a professional career with a global flavor leader.
- Flexible working time.
- Ability to learn and try new things.
- An environment where you will be given space to take ownership and accountability for your work.
Responsibilities:
- Create custom SIEM queries and dashboards to support the monitoring and detection of advanced TTPs.
- Perform host-based analysis, artifact analysis, network packet analysis, and malware analysis in support of security investigations and incident response.
- Coordinate an investigation, containment, and other response activities with business stakeholders and groups
- Develop and maintain effective documentation, including response playbooks, processes, and other supporting operational material.
- Provide mentoring of junior staff and serve as a point of escalation for higher severity incidents.
- Develop incident analysis and findings reports for management, including gap identification and recommendations for improvement.
- Recommend or develop new detection logic and tune existing sensors/security controls.
- Utilize various security tools, technologies, and software to monitor and protect the organization's systems and data.
- Collaborate with cross-functional teams, such as IT, engineering, and management, to ensure that security measures are integrated into all aspects of the organization's operations.
- Work with security solutions owners to assess existing security solutions array ability to detect/mitigate the abovementioned TTPs.
Requairements:
- A bachelor's degree in computer science, information technology, cybersecurity, or a related field is often required.
- Good experience in IT Security Project Management.
- A strong understanding of computer systems, networks, and security technologies is essential.
- Good mediation and facilitation skills.
- Experience with security incident monitoring and response related to medical devices.
- Knowledge of (information) risk management-related standards or frameworks such as COSO, ISO 2700x, CobiT, ISO 24762, BS 25999, NIST, ISF Standard of Good Practice, and ITIL.
- Knowledge of security frameworks.
- Dynamic malware analysis, reverse engineering, and/or scripting abilities
- Proficient with Encase, Responder, X-Ways, Volatility, FTK, Axiom, Splunk, Wireshark, and other forensic tools.
- Understanding of Advanced Persistent Threat (APT) and associated tactics.
- Research, enrichment, and searching of indicators of compromise.
- Very strong team and interpersonal skills along with the ability to work independently and achieve individual goals.
- Coordinate with other team members to achieve the specified objectives.
- Effective oral and written communication skills.