Job Description
Role: Architect, Security Operations Center General Shift 10AM -7PM Primary Skills: Incident response, malware analyst, Thread hunting, Soc analyst /soc associtae/EDR (focus more on), Mitre attack, Meta sploite, Red team, Purple Team certifications - Apart CEH Key responsibilities and accountabilities Expert in Endpoint & Network analysis, to include analysis of relevant logs and data, and background using a variety of analysis tools like EDR, SIEM, Firewall, Proxy, OSINT tools etc Ability to think like an adversary when hunting and responding to security incidents Must perform static and dynamic malware analysis to understand the nature of malware Knowledge on latest TTPs, Vulnerabilities, red team toolsets Ability to lead an investigate an incident starting from detections until post incident activity Passion to learn, as well as a dedication and self-driven desire to keep abreast of latest cybersecurity threats and hacking techniques Advanced. problem-solving skills, and the desire to get your hands dirty Strong verbal, written, and interpersonal communication skills Experience in shellcode analysis and payload analysis Knowledge on core Windows/Linux platforms Expert in AWZ, Azure incident response Should have fair amount of scripting/programming language Should understand disassembly language and use of tools like Gidhra, x64 debugger, Ole debugger Goals The ideal candidate will have a well-rounded understanding of endpoint, network and cloud defenses and detection methodologies, malware analysis, and incident response. They will also have some offensive security experience to allow the ability to think like an adversary. Knowledge, skills, and abilities Experience with red teaming methodologies Experience with penetration testing tools (such as Metasploit, BeEF, Powershell Empire etc) Ability to perform dynamic malware analysis to understand the nature of malware, which includes Shellcode analysis. Ability to understand disassembly language and use of tools like Gidhra, x64 debugger, Ole debugger. Ability to execute in a fast paced, high demand environment while balancing multiple priorities. Passion to learn, as well as a dedication and self-driven desire to keep abreast of latest cybersecurity threats and hacking techniques. Advanced problem-solving skills, and the desire to get your hands dirty Ability to write technical reports and communicate technical content to non-technical audiences. Should have knowledge about latest security vulnerabilities. Ability to think critically and identify areas of technical and non-technical risk
Employement Category:
Employement Type: Full time
Industry: IT Services & Consulting
Role Category: Application Programming / Maintenance
Functional Area: Not Applicable
Role/Responsibilies: Security Operations Center Architect/ SOC Lead
Keyskills:
Red team
SIEM
Firewall
Proxy
Metasploit
BeEF
technical reports
Incident response
malware analyst
Thread hunting
Soc analyst
soc associate
EDR
Mitre attack
Meta sploite
Purple Team
Endpoint Network analysis
EDR
OSINT tools
static
dynamic malware analysis
latest TTPs
Vulnerabilities
red team toolsets
investigate an incident
shellcode analysis
payload analysis
core WindowsLinux platforms
AWZ
Azure incident response
scriptingprogramming language
disassembly language
Gidhra
x64 debugger
Ole debugger
red teaming methodologies
penetration testing tools
Powershell Empire
dynamic malware analysis
Shellcode analysis
disassembly