Software as a Service • Google Apps • Google Search • Google Maps Consulting Services • Google Cloud Platform
201 - 500
5 days ago
Software as a Service • Google Apps • Google Search • Google Maps Consulting Services • Google Cloud Platform
201 - 500
Qodea is dynamic and the role is varied so you’ll get involved in a wide range of activities but here is how a day would look like: •Act as a senior member of the team, driving security incident responses and leading threat hunting initiatives. •Research new attack techniques and analyse logs and system artefacts to develop effective detection logic. •Lead the response to security incidents, conducting thorough investigations using log correlation, malware analysis, and digital forensics, while maintaining clear communication with stakeholders. •Lead threat hunting efforts by analysing infrastructure signals to detect potential attacks and incorporate findings into improved security controls for clients. •Design, implement and maintain detection rules and automation playbooks utilising both no-code platforms and scripting languages. •Administer security tools and optimise log visibility in customer environments while onboarding new systems to SIEM, building integrations for SOAR and overseeing tool performance and configuration. •Maintain an up-to-date knowledge base of investigation guides and runbooks, promoting team contributions and regularly updating incident response plans. •Provide mentorship and technical guidance to junior security analysts. •Participate in our incident response on-call service to support the team when necessary.
Excellent communication skills in English, both written and verbal. •In-depth understanding of how adversaries compromise networks and the stages of an attack. •Experience working in a defensive security role, including identifying threats, investigating incidents, and translating findings into actionable detection mechanisms. •Excellent analytical skills with expertise in conducting large-scale log analysis, including manipulating and correlating log data using queries in SIEM or data lake platforms, as well as scripting with their APIs. •A minimum of 5 years of hands-on experience with enterprise security technologies (e.g., SIEM, SOAR, EDR, and CNAPP solutions), securing operating systems and cloud platforms, and a proven ability to identify indicators of compromise across these environments. •Expertise in automating repetitive tasks using scripting languages (e.g., Python, PowerShell), infrastructure management with IaC, and deployment processes with CI/CD tools. •Self-driven with the ability to work independently and collaborate effectively in teams. •Experience in planning and executing penetration tests to identify vulnerabilities and misconfigurations. •Experience in safeguarding CI/CD pipelines, utilising both commercial and custom-built solutions.
Health Care package •NN Assurance package (life and health) •28 days PTO as standard, plus a flexible annual leave policy and your birthday off •10 learning days per year •Length of service awards •Work from anywhere for up to 90 days per year •Sabbatical leave for employees over 5 years service •Flexible working culture •Meal tickets •Transportation costs •Bookster Platform •Company events - opportunities to meet colleagues you don’t see every day •Regular opportunities for industry recognised training and certifications •Opportunities to develop within a fast growing-tech business with ambitious growth and impact goals
Apply NowOctober 25
10,000+
Managing contracts processes and supporting sales with information security compliance.
October 18
1001 - 5000
Software Engineer role at 3Pillar, focused on innovative tech solutions.
October 10
501 - 1000
Develops cybersecurity protocols to secure Tradeshift systems from intrusions.