Threat Hunter - Consultant

at  Dell

Edinburgh, Scotland, United Kingdom -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate24 Jan, 2025Not Specified25 Oct, 20245 year(s) or aboveSecurity Operations Center,Information Security,Decision Making,Computer Science,Network Security,Communication Skills,Risk Assessment,CompletionNoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

We enjoy competitive compensation and benefits packages, and reward and recognize our employees for exceptional results. A constant focus on continued learning and growth keeps our team members engaged and excited about “what’s next.” We offer flexible work options when available, and emphasize the importance of work-life balance. We know that when our people are rewarded, recognized, and rejuvenated, we win as a team.
Be part of an exciting team that deals with bleeding-edge information security attacks, malware infections, and incident response situations on a daily basis. Protecting our clients from threat actors attempting to compromise their environments.
Working as a Cyber security DevOps analyst involves the use of Python, Pandas data analytics, Jupyter Notebooks and Bash scripting to automate routine tasks and improve efficiency and reduce incident response time.
Additionally, the role requires expertise in interfacing with a variety of security-related APIs for debug and integration purposes into our security ecosystem. The Cybersecurity Analyst is expected to work with software developers and engineers ensuring that development processes are adhered to and the software functions as intended. A core part of the role is identifying, investigating, and resolving security incidents. This needs to be executed with an advanced understanding of attacker methodologies and tactics.

QUALIFICATIONS

  • Proven experience as a Cybersecurity Analyst working in a security operations center (Security analysis or incident response or threat hunting).
  • Excellent knowledge and hands-on experience with Python and Python libraries, particularly Pandas.
  • Experience in utilizing and troubleshooting APIs for system integration.
  • Deep understanding of IT incident response frameworks.
  • Knowledge of AI and automation playbooks integration in a SOC.
  • Strong communication skills and the ability to work effectively in a team.

SKILLS AND ABILITIES

  • Ability to write scripts to automate new and existing tasks.
  • Good threat hunting mindset to easily identify the most relevant information from large contexts of data.
  • Strong technical communication skills, both written and verbal.
  • Risk assessment and decision making
  • The ability to analyze within reason facts and situations, decision making, evaluating consequences of others and undertake acceptable risks.
  • Influencing - the ability to convince others of his opinions and determine them to follow.
  • Task management and planning - The ability to effectively set an adequate action plan for himself/herself and for others, to reach a goal.

EDUCATION/EXPERIENCE

  • 5 + years of relevant experience or equivalent combination of education and work experience:
  • Completion of a Bachelor’s degree or equivalent program in Computer Science, Network Security, Information Security or other applicable field and 5+ years of work experience in the field

Responsibilities:

  • Review security-related events and assess their risk and validity based on available telemetry from network, endpoint, and global threat intelligence information in order to identify good use cases for automation playbooks.
  • Apply Python scripting, Pandas data analysis and bash scripting skills to automate routine tasks and enhance the efficiency of security operations.
  • Develop and implement automation playbooks and AI solutions to improve incident response time and SOC efficiency.
  • API Integration: Interface with various security-related APIs, such as Microsoft Graph, Azure Sentinel, Virustotal, Urlscan, and others, for debugging and integration into our security ecosystem.
  • Working with software developers and software engineers to ensure that development follows established processes and works as intended.
  • Identify, investigate, and resolve security incidents while applying advanced understanding of attacker methodologies and tactics.


REQUIREMENT SUMMARY

Min:5.0Max:10.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Software Engineering

Graduate

The field

Proficient

1

Edinburgh, United Kingdom