Jobs
DM/Manager
- 7-10 years (DM) and 10-14 years (Manager) Information Security experience with at least 5 year of Incident Response experience.
- Solid understanding of MITRE ATT&CK, NIST cyber incident response framework and Cyber kill chain.
- Understanding of Threat Hunting and threat Intelligence concepts and technologies
- Experience of leveraging technical security solutions such as SIEM, IDS/IPS, EDR, vulnerability management or assessment, malware analysis, or forensics tools for incident triage and analysis.
- Deep experience with most common OS (Windows, MacOS, Linux, Android, iOS) and their file systems (ext3.4, NTFS, HFS+, APFS, exFAT etc) Proficiency with industry-standard forensic toolsets (i.e., EnCase, Axiom/IEF, Cellebrite/UFED, Nuix and FTK).
- Experience of enterprise level cloud infrastructure such as AWS, MS Azure, G Suite, O365 etc.
- Experience of malware analysis and understanding attack techniques.
- Ability to work in time-sensitive and complex situations with ease and professionalism, possess an efficient and versatile communication style.
- Essential Certification: CISSP, OSCP, OSCE, eCTHP, GCTI, CTIA, GREM
- Preferred Certification: GCIA, GCIH, GCFA, GSEC, CCSP, Certified SOC Analyst (EC-Council)