Proactively \'hunt\' for potential malicious activity and incidents across the environment using advanced threat network and host-based tools adopting Mitre Attack Framework.
Perform hunting for malicious activity across the network, endpoint, and Critical Assets.
Create hunting hypothesis and perform IOCs & TTPs based threat hunting and share reports with the management weekly on the findings, misconfiguration, use case development and provide suggestions for counter measurement.
Research on different TTP\'s for ATP Threat groups which are used by attackers during the sophisticated Cyber-attacks.
Collaborates with technical and threat intelligence team to provide indications and warnings and contributes to predictive analysis of malicious activity.
Perform cyber security threat hunting & detection activities with specific focus on countermeasure Tactics, Techniques and Procedures (TTPs)
Contribute to the tuning and development of security information and event monitoring systems (SIEM) use cases and other security control configurations to enhance threat detection capabilities.
Evaluates new security technologies and products and performs engineer-level work and analysis to determine if solutions should be pursued.
Requirements
Degree / Diploma in Information Security or related
3 to 5 years of Cyber Threat experience
Expertise in hunting, managing, and writing detections using logs from Endpoint Detect and Response solutions like Carbon Black EDR, CrowdStrike EDR & Cortex XDR etc.
Familiarity with threat modelling, development of attack plans, performing manual & automated Ethical Hacking, & develop proof of concept exploits.
Shortlisted candidates will be offered a 1 year Agency contract employment.