Responsibilities
- Threat Hunting: Proactively search for potential malicious activity and incidents using advanced threat network and host-based tools, leveraging the Mitre Attack Framework.
- Malicious Activity Detection: Perform hunting across the network, endpoint, and critical assets to identify threats.
- Threat Analysis and Reporting: Develop hunting hypotheses, perform IOCs & TTPs based threat hunting, and share weekly reports on findings, misconfigurations, use case development, and countermeasure suggestions with management.
- Detection Management: Utilize logs from Endpoint Detect and Response solutions (e.g., Carbon Black EDR, CrowdStrike EDR, Cortex XDR) to manage and write detections.
- Research and Intelligence Collaboration: Investigate TTPs for ATP threat groups and collaborate with technical and threat intelligence teams for indications, warnings, and predictive analysis of malicious activities.
- Security System Enhancement: Contribute to the tuning and development of SIEM use cases and security control configurations.
- Threat Modelling and Ethical Hacking: Engage in threat modeling, attack plan development, ethical hacking, and proof of concept exploits.
- Technology Evaluation: Assess new security technologies and perform engineer-level analysis to determine their potential application.
The Role
- Security Enhancement: Contribute to securing the organization through technological and process enhancements.
- Security Control Evaluation: Evaluate security controls against established standards, policies, and best practices.
- Technology Management: Improve technology management and perform regular security assessments.
- Team Collaboration: Build relationships with project and operational teams to ensure effective communication and collaboration.
- Technical Skill Development: Demonstrate strong technical skills and a capacity to learn new technologies.
- Threat Analysis: Analyze sophisticated threats using knowledge of the threat landscape and cybersecurity fundamentals.
- Forensic and Incident Response: Utilize forensic analysis and incident response tools for threat identification and assessment.
The Ideal Candidate
- Experience: Minimum of 2 years of relevant threat hunting experience.
- Certifications: Possession of professional certifications such as GIAC Certified Incident Handler Certification (GCIH) or equivalent.
- Technical Skills: Proficiency in Python, SQL, and reverse engineering.
- Communication: Strong communication skills for effective reporting and collaboration with diverse groups.
- Security Knowledge: In-depth understanding of security principles, key technologies, and sustainable risk mitigation strategies.
To Apply:
Please send your latest CV in word file to [email protected]
Kindly indicate your availability, current and expected remuneration package.
We regret that only shortlisted candidates will be notified.
For more job opportunities, please visit our career page: http://quinnox-solutions.com/c...
Quinnox Solutions Pte Ltd (License Number: 06C3126)
Registered EA Personnel (Reg. No.R21103082)