Remote Incident Response Consultant @ Winged IT
warszawa
Our Client: US-based cybersecurity company headquartered in New York City
Location: Remotely from Poland
Salary: up to 50 USD/h + VAT on B2B
Working time: 15:00- 23:00 (Polish time)
Cooperation model: B2B
Start date: ASAP
Recruitment process: 2-3 interviews (screening and two technical interviews about 30 min)
Technology stack: SIEM tools, O365/Azure, Active Directory / Windows, network and host-based firewalls
Our Client is a US-based cybersecurity company headquartered in New York City whose mission is to support its clients in mitigating cyber threats. They are focused on three main areas: Cyber Breach Response, Cloud Security Services, and Proactive Cyber Services. Their military-grade professionals have decades of experience in cyber operations and apply their knowledge of the attacker perspective to facilitate efficient, effective, and scalable responses to cyber breaches. Their growing team combines operational and technological disciplines with instinctual methods to keep their clients’ information safe.
Our client offers:
+ A possibility to join a team of security consultants investigating computer crimes and breaches that make the headlines – and many more that don’t;
+ Great opportunity for personal development in a stable and friendly multinational company;
+ Competitive salary;
+ Remote work together with participation in global projects;
+ A possibility of growing your craft alongside like-minded professionals.
5+ years of experience leading Incident Response investigations, analysis, or containment actions;
Strong understanding of host-based analysis utilizing CrowdStrike, SentinelOne, and Microsoft Defender;
Experience with network and log forensic analysis, malware triage analysis and disk and memory forensics;
Familiarity with enterprise security architecture and security controls;
Knowledge of MITRE ATT&CK framework;
Ability to work non-standard hours (weekends, holidays, and on-shift-based schedules to provide 24/7 on-call coverage);
Analytical and critical thinking skills, organizational skills, and meticulous attention to detail;
Excellent English skills.
Our Client: US-based cybersecurity company headquartered in New York City
Location: Remotely from Poland
Salary: up to 50 USD/h + VAT on B2B
Working time: 15:00- 23:00 (Polish time)
Cooperation model: B2B
Start date: ASAP
Recruitment process: 2-3 interviews (screening and two technical interviews about 30 min)
Technology stack: SIEM tools, O365/Azure, Active Directory / Windows, network and host-based firewalls
Our Client is a US-based cybersecurity company headquartered in New York City whose mission is to support its clients in mitigating cyber threats. They are focused on three main areas: Cyber Breach Response, Cloud Security Services, and Proactive Cyber Services. Their military-grade professionals have decades of experience in cyber operations and apply their knowledge of the attacker perspective to facilitate efficient, effective, and scalable responses to cyber breaches. Their growing team combines operational and technological disciplines with instinctual methods to keep their clients’ information safe.
Our client offers:
+ A possibility to join a team of security consultants investigating computer crimes and breaches that make the headlines – and many more that don’t;
+ Great opportunity for personal development in a stable and friendly multinational company;
+ Competitive salary;
+ Remote work together with participation in global projects;
+ A possibility of growing your craft alongside like-minded professionals.
,[To assist in resolving customers' challenges, such as designing a system to overcome technical obstacles, safeguarding customer data, or advising on various security issues;, To work closely with internal and customer teams to investigate and mitigate incidents. Perform host forensics, network forensics, log analysis, and malware triage to bolster incident response efforts;, To identify and codify attacker Tools, Tactics, and Procedures (TTPs) as well as Indicators of Compromise (IOCs);, To build tools, scripts or methodologies to enhance client's incident investigation processes that can be applied to current and future investigations;, To create and present reports, trainings and presentations for technical and executive audiences;, Utilize client's technology to conduct investigations and examine endpoint and network-based sources of evidence.] Requirements: CrowdStrike, SentinelOne, Microsoft Defender, MITRE ATT&CK, EDR, Incident Response Additionally: International projects, Small teams, In-house trainings.