Threat Hunter - Consultant
at Dell
Edinburgh, Scotland, United Kingdom -
Start Date | Expiry Date | Salary | Posted On | Experience | Skills | Telecommute | Sponsor Visa |
---|---|---|---|---|---|---|---|
Immediate | 24 Jan, 2025 | Not Specified | 25 Oct, 2024 | 5 year(s) or above | Security Operations Center,Information Security,Decision Making,Computer Science,Network Security,Communication Skills,Risk Assessment,Completion | No | No |
Required Visa Status:
Citizen | GC |
US Citizen | Student Visa |
H1B | CPT |
OPT | H4 Spouse of H1B |
GC Green Card |
Employment Type:
Full Time | Part Time |
Permanent | Independent - 1099 |
Contract – W2 | C2H Independent |
C2H W2 | Contract – Corp 2 Corp |
Contract to Hire – Corp 2 Corp |
Description:
We enjoy competitive compensation and benefits packages, and reward and recognize our employees for exceptional results. A constant focus on continued learning and growth keeps our team members engaged and excited about “what’s next.” We offer flexible work options when available, and emphasize the importance of work-life balance. We know that when our people are rewarded, recognized, and rejuvenated, we win as a team.
Be part of an exciting team that deals with bleeding-edge information security attacks, malware infections, and incident response situations on a daily basis. Protecting our clients from threat actors attempting to compromise their environments.
Working as a Cyber security DevOps analyst involves the use of Python, Pandas data analytics, Jupyter Notebooks and Bash scripting to automate routine tasks and improve efficiency and reduce incident response time.
Additionally, the role requires expertise in interfacing with a variety of security-related APIs for debug and integration purposes into our security ecosystem. The Cybersecurity Analyst is expected to work with software developers and engineers ensuring that development processes are adhered to and the software functions as intended. A core part of the role is identifying, investigating, and resolving security incidents. This needs to be executed with an advanced understanding of attacker methodologies and tactics.
QUALIFICATIONS
- Proven experience as a Cybersecurity Analyst working in a security operations center (Security analysis or incident response or threat hunting).
- Excellent knowledge and hands-on experience with Python and Python libraries, particularly Pandas.
- Experience in utilizing and troubleshooting APIs for system integration.
- Deep understanding of IT incident response frameworks.
- Knowledge of AI and automation playbooks integration in a SOC.
- Strong communication skills and the ability to work effectively in a team.
SKILLS AND ABILITIES
- Ability to write scripts to automate new and existing tasks.
- Good threat hunting mindset to easily identify the most relevant information from large contexts of data.
- Strong technical communication skills, both written and verbal.
- Risk assessment and decision making
- The ability to analyze within reason facts and situations, decision making, evaluating consequences of others and undertake acceptable risks.
- Influencing - the ability to convince others of his opinions and determine them to follow.
- Task management and planning - The ability to effectively set an adequate action plan for himself/herself and for others, to reach a goal.
EDUCATION/EXPERIENCE
- 5 + years of relevant experience or equivalent combination of education and work experience:
- Completion of a Bachelor’s degree or equivalent program in Computer Science, Network Security, Information Security or other applicable field and 5+ years of work experience in the field
Responsibilities:
- Review security-related events and assess their risk and validity based on available telemetry from network, endpoint, and global threat intelligence information in order to identify good use cases for automation playbooks.
- Apply Python scripting, Pandas data analysis and bash scripting skills to automate routine tasks and enhance the efficiency of security operations.
- Develop and implement automation playbooks and AI solutions to improve incident response time and SOC efficiency.
- API Integration: Interface with various security-related APIs, such as Microsoft Graph, Azure Sentinel, Virustotal, Urlscan, and others, for debugging and integration into our security ecosystem.
- Working with software developers and software engineers to ensure that development follows established processes and works as intended.
- Identify, investigate, and resolve security incidents while applying advanced understanding of attacker methodologies and tactics.
REQUIREMENT SUMMARY
Min:5.0Max:10.0 year(s)
Information Technology/IT
IT Software - Network Administration / Security
Software Engineering
Graduate
The field
Proficient
1
Edinburgh, United Kingdom