Tech Stack
CloudCyber SecuritySplunk
About the role
- Cyderes is a global full life-cycle cybersecurity services provider offering managed security, identity and access management, and professional services.
- Perform initial triage and advanced analysis tasks across endpoint, SIEM, server, and network infrastructure.
- Perform proactive security investigations and searches on client environment to detect malicious activities.
- Perform Incident investigations and deep dive analysis on detected threats.
- Understand and identify indicators of attack and compromise in alerts, by hunting through data, and by reviewing past investigations.
- Have full understanding of the MITRE ATT&CK framework; map clients’ use cases to tactics and techniques.
- Triage, review, and provide log data for more insight and recommendations to escalate through SIEM.
- Maintain up to date knowledge and understanding of the current threat landscape.
Requirements
- 3 to 5 years of progressing/in-depth IT security experience.
- Demonstrate experience in using any two Endpoint Detection and Response software like Sentinel one, CrowdStrike, Defender, Carbon black etc
- Advanced knowledge of at least one leading SIEM platform like Sentinel or Google Chronicle AND Splunk, Elastic, IBM Qradar, Sumo Logic etc
- Experience in SOC and Incident Response activities.
- Understanding SIEM correlation, use cases and events.
- Should hold at least one industry certification Sec+, CEH, SC 200, Any Cloud Certification and Cloud Security Fundamentals is highly preferred
- Basic scripting or development experience would be an added advantage.
- Good communication skills