The Role:
• Proactively 'hunt' for potential malicious activity and incidents across the environment using advanced threat network and host-based tools adopting Mitre Attack Framework.
• Perform hunting for malicious activity across the network, endpoint, and Critical Assets.
• Create hunting hypothesis and perform IOCs & TTPs based threat hunting and share reports with the management weekly on the findings, misconfiguration, use case development and provide suggestions for counter measurement.
• Expertise in hunting, managing, and writing detections using logs from Endpoint Detect and Response solutions like Carbon Black EDR, CrowdStrike EDR & Cortex XDR, etc.
• Research on different TTP's for ATP Threat groups which are used by attackers during the sophisticated Cyber-attacks.
• Collaborates with technical and threat intelligence team to provide indications and warnings and contributes to predictive analysis of malicious activity.
• Perform cyber security threat hunting & detection activities with specific focus on countermeasure Tactics, Techniques and Procedures (TTPs)
• Contribute to the tuning and development of security information and event monitoring systems (SIEM) use cases and other security control configurations to enhance threat detection capabilities.
• Familiarity with threat modelling, development of attack plans, performing manual & automated Ethical Hacking, & develop proof of concept exploits.
• Evaluates new security technologies and products and performs engineer-level work and analysis to determine if solutions should be pursued.
The Requirements:
• Contribute to securing the organization by enhancing technologies and processes.
• Evaluate security controls against standards, policies, and best practices.
• Improve technology management and perform regular security assessments.
• Build relationships with project and operational teams as needed.
• Exhibit strong technical skills and the capacity to learn new technologies.
• Understand security principles and key technologies, with a focus on sustainable solutions and risk mitigation.
• Analyze sophisticated threats, leveraging knowledge of the threat landscape and cybersecurity fundamentals.
• Utilize forensic analysis and incident response tools to identify and assess threats.
• Have experience in threat hunting, incident response, and familiarity with programming languages like Python and SQL, as well as reverse engineering skills.
• Communicate effectively with diverse groups, reporting key metrics and statuses promptly.
• Possess 2 years and more of highly relevant threat hunting experience.
• Must have professional certifications such as GIAC Certified Incident Handler Certification (GCIH) GCIA or GMON.
To Apply:
Please send your latest CV in word file to [email protected]
Kindly indicate your availability, current and expected remuneration package.
We regret that only shortlisted candidates will be notified.
Quinnox Solutions Pte Ltd (License Number: 06C3126)
Registered EA Personnel (Reg. No.:R1111100)