This role involves threat hunting, analyzing indicators of compromise, validating security controls, investigating vulnerabilities, identifying incident sources, and supporting incident response teams. It requires experience with security infrastructure like EDR, NDR, and TIP solutions, and proficiency in data analysis and threat hunting tools.
Requirements
- Collect and analyse Indicators of Compromise (IOCs)
- Validate and provide recommendations on changes to security controls
- Investigate the existence of indicators of compromise (IoCs)
- Assist in incident response teams in understanding the nature and source of security incidents
- Conduct systematic and targeted searches across hosted and extended infrastructure
- Maintain detailed records of threat hunting activities
- Assist in design use cases and rules for threat detection
- Prepare and deliver comprehensive threat hunting reports
- Assist in designing SOC metrics and dashboards