Technical Lead - Cyber Research & Response

October 20

Apply Now
Logo of Difenda

Difenda

Cyber Risk & Compliance β€’ Cyber Advisory β€’ Cyber Intelligence β€’ Cyber Operations β€’ Managed Detection and Response

51 - 200

Description

β€’ Lead the delivery of advanced Managed Extended Detection & Response (MXDR) service processes, including remote incident response, threat event lifecycle management, Threat Hunting, and Threat Intelligence activities β€’ Lead and execute escalated remote incident response engagements, including incident triage and containment, forensic artefact analysis, incident reporting, and stakeholder management (customers, internal SOC, legal teams, etc.) β€’ Provide proper and intelligent Incident Handling during active Incident Response engagements β€’ Actively execute Threat Hunting and other proactive activities in customer environments β€’ Support the implementation and maintenance of Threat Intelligence practices, including IOC integration into MDR services and providing customer specific tactical and C-Level threat intelligence briefs β€’ Develop, execute, and train staff on MXDR service threat triaging, Threat Hunting, and Threat Intelligence processes β€’ Provide technical guidance and mentorship to SecOps Analysts β€’ Develop and enforce standards and processes to ensure high quality MXDR service delivery (e.g. case management standards) β€’ Work closely with the Cyber Research & Response team members to iteratively enhance MXDR capabilities and other managed security services (e.g. sharing activity results for detection engineering requirements) β€’ Support customer service communications, including operational and executive level meetings and reporting β€’ Identify, develop, communicate and implement process improvements to streamline C3 practices and enhance the customer experience

Requirements

β€’ Minimum of 5 years of IT security related work experience required β€’ College Diploma or University Degree, preferably in technology, required β€’ Strong technical experience in the execution of security operations processes, including threat event lifecycle management, Incident Response, Forensic Investigations, Threat Hunting, and Threat Intelligence activities β€’ Strong technical expertise with security operations technologies including but not limited to SIEM, EDR, Threat Intelligence, and SOAR platforms β€’ Certifications in digital forensics and incident response, such as GIAC GCFA, GCFR, GCIH, GREM strongly preferred β€’ Experience with some of the following technologies preferred: Microsoft Sentinel, Microsoft Defender for Endpoint, Microsoft 365 and Azure security services, Azure services and cloud service automation β€’ Experience working with security operations teams required β€’ Strong background in customer service and communications required β€’ Strong presentation development, reporting and delivery skills required β€’ Familiarity with Agile methodologies such as Lean, Scrum and Kanban preferred β€’ Strong ability to communicate and document clearly and effectively β€’ Ability to follow processes and guidelines β€’ Ability to work with all levels of staff β€’ Ability to take personal initiative and observe confidentiality β€’ Ability to work with internal and external vendors in a professional manner β€’ Ability to multi-task in a fast-paced environment

Apply Now

Similar Jobs

Built byΒ Lior Neu-ner. I'd love to hear your feedback β€” Get in touch via DM or lior@remoterocketship.com