Job Description:
- Hunt and identify threat actor groups and their techniques, tools and processes.
- Work with the engineering team to transform attacker TTPs into viable, low false-positive behavioural and signature detection using a variety of techniques including Machine Learning, with an emphasis on sequential classification and pattern-matching.
- Provide expert analytic investigative support of large scale and complex security incidents
- Continuously improve processes for use across multiple detection sets for more efficient operations
- Document best practices using available collaboration tools and workspace
- Communicate potential threats, suspicious/anomalous activity, malware, etc., to the IR team, and be a point of contact to the customer
- Perform analysis of security incidents & threat actors for further enhancement of Detection Catalog and Hunt missions by leveraging the MITRE ATTACK framework
- Continuously improve processes for enhancing threat detection-Work with data scientists to develop new analytical model for hunting
- Ability to translate cyber and application security issues into analytical models. Capability to effectively multitask
- Excellent verbal and written communication skills.
Beneficial:
- Good Documentation skills
- Good at Incident Management.
Personal Characteristics:
- Strong communication skills, ability to work comfortably with different regions
- Actively participate within internal project community
- Good team player, ability to work on a local, regional and global basis and as part of joint cross location initiative.
- Self-motivated, able to work independently and with a team
- Able to perform under pressure.