Responsibilities
- Monitor and respond to security incidents within a SOC or CSIRT environment
- Analyze security events using frameworks like MITRE ATT&CK® and OWASP to identify threats and vulnerabilities
- Conduct malware and exploit analysis, and perform reverse engineering as needed
- Develop and execute threat hunts to proactively detect risks
- Correlate log files and analyze security events, including network protocols and system memory
- Manage major incident responses or breach investigations
Requirements
- 3-5 years experience as a SOC analyst or incident responder in a SOC/CSIRT setting
- Strong knowledge of MITRE ATT&CK® and OWASP frameworks
- Malware analysis and threat hunting experience
- Excellent written and verbal communication skills in English
- Ability to manage incidents and perform forensic acquisitions
- Experience with Amazon AWS is advantageous