Security Analyst - L1, L2, L3

October 20

Apply Now
Logo of Horangi Cyber Security - a Bitdefender company

Horangi Cyber Security - a Bitdefender company

Incident Response • Security Assessments • Digital Forensics • Policy and Governance • Training

51 - 200 employees

🔒 Cybersecurity

📋 Compliance

💰 $20M Series B on 2020-03

Description

• About Bitdefender : • Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. • Guardian over millions of consumer, enterprise, and government environments, Bitdefender is one of the industry’s most trusted experts for eliminating threats, protecting privacy, digital identity and data, and enabling cyber resilience. • With deep investments in research and development, Bitdefender Labs discovers hundreds of new threats each minute and validates billions of threat queries daily. • The company has pioneered breakthrough innovations in antimalware, IoT security, behavioral analytics, and artificial intelligence and its technology is licensed by more than 180 of the world’s most recognized technology brands. • Founded in 2001, Bitdefender has customers in 170+ countries with offices around the world. • Our mission at Bitdefender is to reduce risk to customers’ business to allow them to achieve their objectives. • We are focused on delivering real security value for an affordable price – no snake oil. • To help in this mission, we are looking for a Security Analyst. • You will work in a tight knit, experienced team backed up by an international organization that’s been in business for 18 years. • The Managed Detection & Response service is a new line of business. • Our team has been around the block together and operate in a 24x7 environment where we manage emergency situations for customers. • For this to work, we must trust each other. • As a leadership team, we focus on building that trust through accountability, processes and personal relationships.

Requirements

• Be able to demonstrate understanding of cybersecurity principles, • Cybersecurity principles • Cyber threats and vulnerabilities • Current incident response methodologies • Current cyber investigative techniques • Current cyber threat trends • Computer networking concepts and protocols, and network security methodologies • Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, NICs, HDDs) • Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security • Basic system administration, network, and operating system hardening techniques • Identifying, modifying, and manipulating applicable system components within Windows, Unix, or Linux (e.g., passwords, user accounts, files) • Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings) • Defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness) • Virtualization and cloud computing • Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files • Hacking methodologies • Networking protocols (e.g., TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications • Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA]) and how they are used • How to perform packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump) • Security Information and Event Management (SIEM) tools - Searching, aggregating, and correlating data • Web Application Firewall (WAF) • Regular Expressions (Regex)

Apply Now
Built by Lior Neu-ner. I'd love to hear your feedback — Get in touch via DM or lior@remoterocketship.com