Incident Response Consultant
warszawa
technologies-expected :
CrowdStrike
SentinelOne
Microsoft Defender
EDR
MITRE ATT&CK
about-project :
Our Client is a US-based cybersecurity company headquartered in New York City whose mission is to support its clients in mitigating cyber threats. They are focused on three main areas: Cyber Breach Response, Cloud Security Services, and Proactive Cyber Services. Their military-grade professionals have decades of experience in cyber operations and apply their knowledge of the attacker perspective to facilitate efficient, effective, and scalable responses to cyber breaches. Their growing team combines operational and technological disciplines with instinctual methods to keep their clients’ information safe.
Our Client: US-based cybersecurity company headquartered in New York City
Location: Remotely from Poland
Salary: up to 50 USD/h + VAT on B2B
Working time: 15:00- 23:00 (Polish time)
Technology stack: SIEM tools, O365/Azure, Active Directory / Windows, network and host-based firewalls
responsibilities :
To assist in resolving customers' challenges, such as designing a system to overcome technical obstacles, safeguarding customer data, or advising on various security issues;
To work closely with internal and customer teams to investigate and mitigate incidents. Perform host forensics, network forensics, log analysis, and malware triage to bolster incident response efforts;
To identify and codify attacker Tools, Tactics, and Procedures (TTPs) as well as Indicators of Compromise (IOCs);
To build tools, scripts or methodologies to enhance client's incident investigation processes that can be applied to current and future investigations;
To create and present reports, trainings and presentations for technical and executive audiences;
Utilize client's technology to conduct investigations and examine endpoint and network-based sources of evidence.
requirements-expected :
5+ years of experience leading Incident Response investigations, analysis, or containment actions;
Strong understanding of host-based analysis utilizing CrowdStrike, SentinelOne, and Microsoft Defender;
Experience with network and log forensic analysis, malware triage analysis and disk and memory forensics;
Familiarity with enterprise security architecture and security controls;
Knowledge of MITRE ATT&CK framework;
Ability to work non-standard hours (weekends, holidays, and on-shift-based schedules to provide 24/7 on-call coverage);
Analytical and critical thinking skills, organizational skills, and meticulous attention to detail;
Excellent English skills.
offered :
A possibility to join a team of security consultants investigating computer crimes and breaches that make the headlines – and many more that don’t;
Great opportunity for personal development in a stable and friendly multinational company;
Competitive salary;
Remote work together with participation in global projects;
A possibility of growing your craft alongside like-minded professionals.