Jobs

DM/Manager

- 7-10 years (DM) and 10-14 years (Manager) Information Security experience with at least 5 year of Incident Response experience.

- Solid understanding of MITRE ATT&CK, NIST cyber incident response framework and Cyber kill chain.

- Understanding of Threat Hunting and threat Intelligence concepts and technologies

- Experience of leveraging technical security solutions such as SIEM, IDS/IPS, EDR, vulnerability management or assessment, malware analysis, or forensics tools for incident triage and analysis.

- Deep experience with most common OS (Windows, MacOS, Linux, Android, iOS) and their file systems (ext3.4, NTFS, HFS+, APFS, exFAT etc) Proficiency with industry-standard forensic toolsets (i.e., EnCase, Axiom/IEF, Cellebrite/UFED, Nuix and FTK).

- Experience of enterprise level cloud infrastructure such as AWS, MS Azure, G Suite, O365 etc.

- Experience of malware analysis and understanding attack techniques.

- Ability to work in time-sensitive and complex situations with ease and professionalism, possess an efficient and versatile communication style.

- Essential Certification: CISSP, OSCP, OSCE, eCTHP, GCTI, CTIA, GREM

- Preferred Certification: GCIA, GCIH, GCFA, GSEC, CCSP, Certified SOC Analyst (EC-Council)