Responsibilities
- Monitor and respond to security incidents within a SOC or CSIRT environment
- Proactively identify threats and vulnerabilities using frameworks like MITRE ATT&CK® and OWASP
- Conduct malware and exploit analysis, and perform reverse engineering as needed
- Develop and execute threat hunts to proactively detect risks
- Correlate log files and analyze security events, including network protocols and system memory
- Manage major incident responses or breach investigations
Requirements
- 3-5 years experience as a SOC analyst or incident responder in a SOC/CSIRT setting
- Strong knowledge of threat landscape using MITRE ATT&CK® and OWASP frameworks
- Good experience in SIEM
- Experience in security events analysis on, eg malware, network protocols, Microsoft, Linux
- Experience in threat hunting
- Excellent written and verbal communication skills in English
- Ability to manage incidents and perform forensic acquisitions
- Experience with Amazon AWS is advantageous