Most recent job postings at securityintelligence
via Greenhouse posted_at: 12 days agoschedule_type: Full-time
The SOC Manager is responsible for all internal cyber security operations tasks and management of the Security Operations Center and the analyst staff associated with the SOC. The manager provides direction to the analysts as well as acts as a liaison to other teams within SIE. This is a position for a self-motivated candidate. The SOC is responsible for 24x7 security monitoring, triage and... response across SIE globally. The Security Operation The SOC Manager is responsible for all internal cyber security operations tasks and management of the Security Operations Center and the analyst staff associated with the SOC. The manager provides direction to the analysts as well as acts as a liaison to other teams within SIE. This is a position for a self-motivated candidate.

The SOC is responsible for 24x7 security monitoring, triage and... response across SIE globally. The Security Operation Center is the main point of contact for any suspected security incident. They work together with the Incident Response team and other subject-matter experts on resolving incidents and remediating threats across SIE organizations, PlayStation Network, and PlayStation Studios.

Essential Duties and Responsibilities:
• Serves as team leader and mentor, defining and tracking goals and performance for SOC analysts.
• Ensure that Service Level Agreements are defined, tracked and met across SIE.
• Develop measurement capabilities and metrics to track and communicate performance, coverage and risk. Maintain awareness of trends in security regulatory, technology, and operational requirements.
• Mentor and guide SOC Lead and Analysts, perform knowledge transfer as required.
• Drive the expansion and growth of the SOC; drive evaluation and integration of new products.
• Ensure that Standard Operating Procedures are up-to-date and followed by the team.
• Seek opportunities to improve security monitoring and operational tasks.
• Evaluate existing SIEM rules, content, events and use cases and adapt to meet the business requirements.
• Work with outside teams in the development of a comprehensive set of operational security policies and standards designed to permit the organization to achieve its business objectives while effectively handling our security and compliance requirements of meeting PCI and SOX goals.
• Improve reports and present in front of leadership on a regular basis.
• Ensure that reports via PlayStation's public bug bounty program are properly handled.

Required Experience, Skills and Knowledge:
• 3+ years managing a team. 5+ years working within the information security field, with emphasis on global (24x7) security operations, incident management, intrusion analysis.
• Solid understanding of general cybersecurity concepts. In-depth familiarity with security policies based on industry standards.
• Thorough knowledge of SIEM technologies, like Splunk ES; proficient with case management and ticketing systems.
• Demonstrated understanding of cyber attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs). Demonstrated hands-on experience analyzing high volumes of logs, network data and other attack artifacts.
• Demonstrated dedication to training, self-study and maintaining proficiency in the cyber security domain.
• Experience with automation development and implementation.
• Ability to lead and communicate efficiently across distributed and diverse teams.
• Experience with cloud environments such as AWS, Azure, GCP and proficient with cloud security services.
• Experience with Endpoint Security, Cloud Security, Network and Application Security.

Desired:
• Knowledge of and experience in Database Activity Monitoring (DAM), Public Key Infrastructure (PKI), Data Loss Prevention (DLP), Identity and Access Management (IAM), PCI Security Standards.
• Bachelor of Science in Computer Science, Computer Engineering, Information Technology, Cyber Security, Intelligence studies or equivalent experience.
• Certifications such as SANS/GIAC GSOM, GSOC, GCIA, GCIH and other are a plus, but skill level carries more weight.

#LI-GM1
Show more details...
via Recruit.net posted_at: 2 days agoschedule_type: Part-time
ABOUT At any given moment, hundreds of complex networked computer systems are operating in tandem to keep ships and submarines operating at their best. The specialized training you’ll receive in this field will pave the way to careers in IT and network support, computer programming, web development and information security... The mission of the Navy Reserve is to provide strategic depth and deliver operational capabilities to the Navy and Marine ABOUT
At any given moment, hundreds of complex networked computer systems are operating in tandem to keep ships and submarines operating at their best. The specialized training you’ll receive in this field will
pave the way to careers in IT and network support, computer programming, web development and information security...
The mission of the Navy Reserve is to provide strategic depth and deliver operational capabilities to the Navy and Marine Corps team and Joint forces, in times of peace or war. Navy Reserve Sailors seamlessly
support and actively aid that mission, all while continuing to lead their own independent lives in the civilian world. If you’re interested in becoming an Aircrewman in the Navy Reserve, check out the
following careers available in the field.
COMPUTER SCIENCE & INFORMATION SECURITY JOBS IN THE NAVY RESERVE
INFORMATION SYSTEMS TECHNICIAN
When a network goes down, vital information may be lost, from global satellite data to special
intelligence communications. That’s why it’s critical that trained Information Systems Technicians
are on board to make sure networks and related systems are designed and operated properly
and errors are fixed without any interruption to the mission.
INTELLIGENCE SPECIALIST
Collect intel on everything—data on foreign cultures, enemy movements, current weather
forecasts, etc. Then, use it to create cohesive intelligence briefings for high-ranking Navy
officials. Your deep understanding of global culture and battlespaces makes you a critical
component of mission readiness. Solid intel isn’t easy to come by, but as an IS, you can save lives
by helping us stay ready for anything.
CRYPTOLOGIC TECHNICIAN INTERPRETIVE
Languages are more than just communication—they’re cultural codes that need to be analyzed
and in some cases, broken. As a Cryptologic Technician Interpretive (CTI) you’re more than a
linguist—you’re a cultural expert, able to translate and interpret foreign communications.
CRYPTOLOGIC TECHNICIAN COLLECTION
There aren’t many careers that require a security clearance before you learn about everything
you’ll be doing on the job. But as a Cryptologic Technician Collection, much about your role is
classified. What we can tell you is this: you will intercept signals to provide tactical and strategic
intelligence, technical guidance and information to ships and special warfare units. Your job is to
report threats to protect the fleet and save lives. We’re looking for someone whose brain is built
for solving puzzles and picking out patterns most will miss. As a CTR, a sharp mind is your
strongest asset.
CRYPTOLOGIC TECHNICIAN NETWORKS
As a Cryptologic Technician Networks, you fight in the battlespace of the future. Use state-ofthe-art technology to perform offensive and defensive cyber operations, investigating and
tracking enemies while also protecting our networks from attacks. As an expert in communication defense and forensics, you’ll be expected to rise to the ever-evolving challenge
of maintaining cybersecurity.
PAY & BENEFITS
When you serve your country, you become a part of something truly important – and you deserve to be
rewarded accordingly. Navy Reserve Sailors enjoy a comprehensive range of benefits, from state-of-theart training to extensive educational assistance, VA benefits and more.
In return for your service and dedication, the Navy Reserve provides you with the benefits to succeed in
both your military and civilian lives:
• Receive 4 days of basic pay for only 2 days worked (16 hours) each drill weekend
• Opportunities to acquire new skills and sharpen existing ones, enhancing your civilian career
• Educational assistance
• Tax-free, worldwide Navy Exchange and commissary privileges for you and your family
• VA guaranteed home loans
• Low-cost insurance options, including up to $400,000 in life insurance
• Travel opportunities
• Earn points toward retirement benefits every time you drill
• Retirement after 20 qualifying years
• TRICARE
EDUCATION OPPORTUNITIES
Navy Reserve Sailors continue to hold educational opportunities through Tuition Assistance, DANTES
and their post 9/11 or Montgomery GI Bill. Further education opportunities are also available through
the US Naval War College and Senior Enlisted Academy, as well as certifications and licenses available
through the Navy Credentialing Opportunities Online (COOL).
QUALIFICATIONS AND REQUIREMENTS
• U.S. citizen or equivalent
• High school graduate or equivalent
• 17 years of age or older
General qualifications may vary depending upon whether you’re currently serving, whether you’ve
served before or whether you’ve never served before.
WORK ENVIRONMENT
Serving part-time as a Navy Reserve Sailor, your duties will be carried out during your scheduled drilling
and training periods. During monthly drilling, Sailors in the Navy Reserve typically work at a location
close to their homes.
Take a moment to learn more about the general roles and responsibilities of Navy Reserve Sailors
Show more details...
via ZipRecruiter schedule_type: Full-time
In this role, you will focus on developing and executing threat hunting operations to discover adversary activities that are not detected through traditional detection capabilities. You will be able to leverage first class security partners and threat intelligence teams to derive and hunt on known indicators of compromise, as well as developing strategies for discovering new techniques used by... adversaries. For greatest impact, you will develop In this role, you will focus on developing and executing threat hunting operations to discover adversary activities that are not detected through traditional detection capabilities. You will be able to leverage first class security partners and threat intelligence teams to derive and hunt on known indicators of compromise, as well as developing strategies for discovering new techniques used by... adversaries.

For greatest impact, you will develop and automate your hunt methodologies and findings to operationalize the capability across the Security Operations Center (SOC). Extending beyond the traditional blue team role, you will engage red teams and participate in purple team exercises that will build your perspective of the adversarial mindset as well as identify new techniques that need to be hunted. Finally, you will play a critical role in the continuous monitoring and response to major Incidents affecting the enterprise.

Requirements

Key responsibilities:
• Develop, document, and execute threat hunting operations to detect known adversary TTPs.
• Perform threat hunting operations across numerous data sets and security products to identify new and emerging adversary TTPs.
• Build and deploy automation and tools that enable hunting methodologies, investigation techniques, data enrichment, and workflow efficiencies. Operationalize these capabilities across the SOC.
• Document and communicate hunt methodologies and findings. Provide metrics to measure the impact of hunting operations.
• Collaborate with internal security partners, red teams, and threat intelligence teams to identify, prioritize, and research threat actor behaviors.
• Detect and respond to advanced threats, actor techniques, anomalous or suspicious activity, combined with intelligence, to identify potential and active risks to systems and data
• Provide investigations, response, and root cause analysis to major incidents affecting the enterprise
Qualifications

Basic Qualifications:
• Bachelor’s degree in Computer Science or Engineering, or a related field, or equivalent alternative education, skills, and/or practical experience.
• 3 years of experience in security operations, threat hunting and analysis, and/or incident response
• At least 1 year of experience automating and/or scripting with Python, Jupyter Notebooks, PowerShell, C#, or javascript
• At least 1 year of experience working with SQL-based databases, Kusto, Log Analytics.

Preferred Qualifications:
• Must have strong verbal and written communication skills; ability to communicate effectively to internal and external business partners as well as technical, and non-technical staff
• Demonstrated enthusiasm for learning new things and ability to pick up new ideas quickly
• Participate in current operations shifts, on call rotation, and focus area rotations
• Demonstrated knowledge of common/emerging attacks techniques.
• Experience developing on Azure PaaS technologies such as; Functions (and Durable Functions), Storage (blob, table, queues) and Logic Apps
• Experience correlating across very large and diverse datasets (Azure Data Lake, Azure Data Explorer, Cosmos DB).
• Experience in analyzing a wide variety of network and host security logs to detect and resolve security issues
• Understanding of common threat analysis model’s such as the Diamond Model, Cyber Kill Chain, and MITRE ATT&CK
• Deep understanding of system internals on MacOS, Windows, and Linux
• Background in malware analysis
• Experience working within a diverse organization to gain support for your ideas; Seeks to leverage work of others to increase effectiveness
• Ability to effectively multi-task and prioritize in a fast-paced environment
• Demonstrates maturity and leadership qualities when dealing with conflicting views and difficult conversations

The ideal candidate will have experience in a team environment, experience in a Security Operations Center or equivalent experience in enterprise scale services and platforms, experience in development of security tools and automated investigations to support hunting operations, technical depth in highly dynamic, complex environment
Show more details...
via Work For Warriors posted_at: 17 days agoschedule_type: Full-timesalary: 92K–138K a year
REQ#: RQ167926 PUBLIC TRUST: NONE... REQUISITION TYPE: REGULAR YOUR IMPACT Own your opportunity to work with the largest government agency in the nation. Make an impact by advancing the Department of Defense’s mission to keep our country safe and secure. JOB DESCRIPTION General Dynamics is seeking a professional Information Security Engineer who can configure systems following Department of Defense (DoD) Certification and Accreditation (C&A) REQ#: RQ167926

PUBLIC TRUST: NONE...

REQUISITION TYPE: REGULAR

YOUR IMPACT

Own your opportunity to work with the largest government agency in the nation. Make an impact by advancing the Department of Defense’s mission to keep our country safe and secure.

JOB DESCRIPTION

General Dynamics is seeking a professional Information Security Engineer who can configure systems following Department of Defense (DoD) Certification and Accreditation (C&A) guidance and perform C&A assessments to evaluate compliance with established cyber security policies and regulations in support of the DCGS-N Increment 2 program and associated installation enclaves.

Qualified candidates should possess knowledge and experienced in the following:
• Assist with conducting Security Testing & Evaluation (ST&E) for enclave and system accreditations and provide corrective actions to resolve or mitigate vulnerabilities that are identified in a lab environment.
• Validate system compliance for the fielded system and ensure the systems meet the accreditation requirements, and report all CAT1 a CAT2 findings in a written reports.
• Develop, modify, review, and provide input for C&A packages for accreditation and re-accreditation by assessing the validity of vulnerabilities identified during formal Government accreditation testing in the lab environment.
• Validate system compliance and ensure the systems meet the accreditation requirements in a lab environment.
• Update documentation for system and program technical descriptions in a lab environment.
• Attend development collaboration meetings with Echelon II, Certifying Authority (CA) and Designated Approving Authority (DAA) as requested and provide detailed reports.
• Provide lab-based engineering guidance based on DoD and industry Security Best Business Practices, security requirements and cyber security trends and solutions to include risk assessments and mitigation.
• Participate in meetings up to the TS/SCI level, reviewing data at the SCI level and required to access JWICS.

Desired Skills / Qualifications / Education
• BS degree; additional years of experience may be considered in lieu of degree
• 5-8 years of experience in Information Assurance / Cyber Security
• System Administration / Operating System certifications
• Security+
• Active Secret Clearance

WORK REQUIREMENTS

YEARS OF EXPERIENCE

5 + years of related experience
• may vary based on technical training, certification(s), or degree

CERTIFICATION

CompTIA - Security+ - CompTIA

TRAVEL REQUIRED

Less than 10%

CITIZENSHIP

U.S. Citizenship Required

SALARY AND BENEFIT INFORMATION

The likely salary range for this position is $92,000 - $138,000. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
View information about benefits and our total rewards program.

ABOUT OUR WORK

We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 30 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.

Chuck Callahan
Show more details...
via San Diego, CA - Geebo posted_at: 2 days agoschedule_type: Full-timesalary: 20–28 an hour
Job summaryAs a member of the Security Intelligence data team under Infosec, you'll be part of a large enterprise Security organization that spans over ten countries worldwide and a wide variety of customer use cases including security intelligence, application security, incident response, security operations, risk and compliance, acquisitions and subsidiaries, and external partner security. You... will work with a wide variety of roles, including Job summaryAs a member of the Security Intelligence data team under Infosec, you'll be part of a large enterprise Security organization that spans over ten countries worldwide and a wide variety of customer use cases including security intelligence, application security, incident response, security operations, risk and compliance, acquisitions and subsidiaries, and external partner security.
You... will work with a wide variety of roles, including Software Development Engineers, BI engineers, Data Engineers, Technical Program Managers, and our Security Engineer customers to create and support useful datasets for security investigations, application modeling, and more.
You will use the Consumer organization's largest security data lake using internal tools and AWS services such as EMR, Glue, Athena, Redshift, S3, SNS, SQS, and more.
Our lake has 500
datasets from different sources and datasets with large daily volumes >1TB/day.
If you want to work with datasets >1PB, we have that too!Our Data Engineer needs to be able to gather and understand data requirements, partner with software engineers, and work across roles and teams to create the data infrastructure and pipelines necessary to drive our team's initiatives.
We have high visibility data ingestion goals in a fast paced, operational environment.
The ideal candidate would enjoy the challenge of operating complex and mission critical systems under extreme loads.
Do you think you are up to the challenge? Would you like to learn more and stretch your skills and career?.
Estimated Salary: $20 to $28 per hour based on qualifications
Show more details...
via San Diego, CA - Geebo posted_at: 2 days agoschedule_type: Full-timesalary: 20–28 an hour
Job summaryThe Security Products group is responsible for building products that secure Amazon. com. We are connected to all parts of Amazon's business and its massive, worldwide service-oriented architecture... We are looking for a Software Development Manager to lead the graph data team. The team will comprise of data engineers, software engineers , business intelligence engineers etc, who will collectively work towards transforming data and making Job summaryThe Security Products group is responsible for building products that secure Amazon.
com.
We are connected to all parts of Amazon's business and its massive, worldwide service-oriented architecture...
We are looking for a Software Development Manager to lead the graph data team.
The team will comprise of data engineers, software engineers , business intelligence engineers etc, who will collectively work towards transforming data and making it meaningful for analytics and investigation.
These products will help Amazon protect corporate and customer data, reduce developer effort, and preserve the trusted experience that Amazon provides for its customers.
This is a green-field initiative with plenty of opportunity to innovate and deliver.
As a leader of the team, you will own the architecture and vision for the products.
You will work closely with partner teams across Amazon, information security, and core platform engineering teams to ensure the needs of our customers are clearly understood and effectively addressed.
You will collaborate with the senior leadership team to drive key engineering and business decisions that achieve the right outcomes.
Successful candidates for this position must have experience in growing and coaching a highly qualified team of software engineers.
They must possess strong verbal and written communication skills, be self-driven and deliver high quality results in a fast-paced environment.
You will be able to Think Big to develop a plan and invent mechanisms that scale to meet the broad and diverse needs of engineers across Amazon.
You will have a strong customer obsession, working to deeply understand the needs of your customers and relentlessly looking to improve their experience and make them more productive.
.
Estimated Salary: $20 to $28 per hour based on qualifications
Show more details...
via San Diego, CA - Geebo posted_at: 2 days agoschedule_type: Full-timesalary: 20–28 an hour
The Amazon Web Services team is looking for a focused Security Incident Response Engineer who can take on a leadership role in responding to security issues across the largest cloud provider in the world. The right candidate must thrive in high-pressure situations, think like both an attacker and defender, and drive engineering teams to take the right actions in the right time frames to mitigate... risks. We are looking for an individual who can balance The Amazon Web Services team is looking for a focused Security Incident Response Engineer who can take on a leadership role in responding to security issues across the largest cloud provider in the world.
The right candidate must thrive in high-pressure situations, think like both an attacker and defender, and drive engineering teams to take the right actions in the right time frames to mitigate... risks.
We are looking for an individual who can balance technical risks against business risks and consistently drive for the right results.
They must have the passion for engineering solutions to complex security challenges, and recognize and fill gaps in capabilities.
The ability to quickly design and build internal-facing tools that enable scaled programmatic automation is core to our organization.
The successful candidate will have a good mix of deep technical knowledge and a demonstrated background in information security.
We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence.
.
Estimated Salary: $20 to $28 per hour based on qualifications
Show more details...
via Adzuna posted_at: 5 days agoschedule_type: Full-time
Are you interested in an exciting role to provide expertise in securing a large, multi-cloud environment? In this role, you will be responsible for providing technical expertise and direction in developing, deploying, and supporting secure cloud architectures and practices! Responsibilities... • Be the security expert to engage with teams for the deployment and management activities of connectors, configurations, and development activities within Are you interested in an exciting role to provide expertise in securing a large, multi-cloud environment? In this role, you will be responsible for providing technical expertise and direction in developing, deploying, and supporting secure cloud architectures and practices!

Responsibilities...
• Be the security expert to engage with teams for the deployment and management activities of connectors, configurations, and development activities within the cloud
• Deploy and manage security tools such as Palo Alto's Prisma Cloud solution
• Investigate security incidents and troubleshoot cloud related issues
• Govern cloud configurations to communicate compliance
• Develop and maintain runbooks/procedural documentation

Qualifications
• 10+ years related IT field experience
• 5+ years of knowledge and technical hands-on experience managing/deploying cloud capabilities with one or more cloud environments (AWS, Azure, GCP, OCI)
• Hands-on experience with Prisma Cloud, WIZ or other cloud governance/reporting tools and ability to describe remediation practices
• Technical proficiency in the fields of network and operating system security, cryptography, software security, security operations, incident response, and emergent security intelligence
• Posses one or more cloud certifications such as AWS Solutions Architect, MS Azure Solutions Architect, GCP Cloud Architect, ISC2 CCSP

Preferred Qualifications
• Bachelor's degree in computer science or equivalent
• Experience integrating security tools into CI/CD pipelines
• Hands-on experience with Prisma Cloud for cloud governance, CI/CD pipeline integration, automated remediation, and runtime protection
• Ability to develop programmatic solutions that achieve business requirements while keeping an acceptable level of risk
• Current cloud security certifications at Architect, Engineering or increased levels

At Danaher we believe in designing a better, more sustainable workforce. We recognize the benefits of flexible, remote working arrangements for eligible roles and are committed to providing enriching careers, no matter the work arrangement. This position is eligible for a remote work arrangement in which you can work remotely from your home. Additional information about this remote work arrangement will be provided by your interview team. Explore the flexibility and challenge that working for Danaher can provide.

The salary range for this role is $150,000 to $195,000. This is the range that we in good faith believe is the range of possible compensation for this role at the time of this posting. We may ultimately pay more or less than the posted range. This range may be modified in the future.

This job is also eligible for bonus/incentive pay.

We offer comprehensive package of benefits including paid time off, medical/dental/vision insurance and 401(k) to eligible employees.

Note: No amount of pay is considered to be wages or compensation until such amount is earned, vested, and determinable. The amount and availability of any bonus, commission, benefits, or any other form of compensation and benefits that are allocable to a particular employee remains in the Company's sole discretion unless and until paid and may be modified at the Company's sole discretion, consistent with the law.

#LI-Remote

#LI-

At Danaher we bring together science, technology and operational capabilities to accelerate the real-life impact of tomorrow's science and technology. We partner with customers across the globe to help them solve their most complex challenges, architecting solutions that bring the power of science to life. Our global teams are pioneering what's next across Life Sciences, Diagnostics, Biotechnology and beyond. For more information, visit www.danaher.com.

Danaher Corporation and all Danaher Companies are committed to equal opportunity regardless of race, color, national origin, religion, sex, age, marital status, disability, veteran status, sexual orientation, gender identity, or other characteristics protected by law. We value diversity and the existence of similarities and differences, both visible and not, found in our workforce, workplace and throughout the markets we serve. Our associates, customers and shareholders contribute unique and different perspectives as a result of these diverse attributes.

The EEO posters are available here.

We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform crucial job functions, and to receive other benefits and privileges of employment. Please contact us at applyassistance@danaher.com to request accommodation
Show more details...
via ZipRecruiter posted_at: 2 days agoschedule_type: Full-time
The client's mission is to protect the worlds most sensitive data by equipping organizations to detect, investigate and stop advanced cyber-attacks. Attackers are relentless and clever. They hide their exploits deep inside networks, email and endpoints. They dig as deep as attackers hide. With it, customers will know when they are being attacked, and they can retrace attackers steps and freeze... them in their tracks. The elite team of incident The client's mission is to protect the worlds most sensitive data by equipping organizations to detect, investigate and stop advanced cyber-attacks.

Attackers are relentless and clever. They hide their exploits deep inside networks, email and endpoints. They dig as deep as attackers hide. With it, customers will know when they are being attacked, and they can retrace attackers steps and freeze... them in their tracks.

The elite team of incident responders is in the trenches every day assisting customers to manage their way through critical security incidents of all kinds. This seat on the front lines gives us a unique view to see what works and what doesnt when it comes to keeping attackers at bay.

Take a seat with our preeminent team and be a part of our mission to give our customers the power to combat todays sophisticated advanced threats with a robust, comprehensive portfolio of products, services, and expertise.

Join a team where you can make a difference!

What about the project?

The client, the industry innovator in proactive cyber defense solutions, safeguards modern IT environments with unparalleled detection, deception, response, cloud security, and compliance capabilities. We offer full visibility across hybrid environments via rich, dynamic cyber terrain mapping and multi-faceted context and risk assessment.

These features help minimize attackable surface areas, automate exposure prevention, threat-detection, and incident response, and provide the context, accuracy, speed, and portability security professionals need to find and neutralize adversaries earlier in the attack lifecycle.

With this company, organizations remain resilient before and throughout cyber-attacks and emerge stronger and more secure.

We are looking for a Threat Researcher to help fuel our cutting-edge NDR and Cloud products that defend organizations from a variety of cyber threats.

Requirements:
• Experience authoring rules using YARA/Snort/Suricata and Bash scripting
• Expert knowledge of network fundamentals and protocols (HTTP, SMTP, DNS, SMB, etc) is required
• Experience with Bash/Shell scripting
• Experience with network and packet analysis using tools such as Wireshark
• Previous experience within the cybersecurity industry
• Able to work independently on tasks within a team environment

Nice to have:
• Experience working with security benchmarks such as CIS benchmarks
• Understanding of the adversary tactics and techniques frameworks
• Experience with incident response and documentation is strongly desired
• Experience writing malware detection and prevention rules is applications such as Suricata, and YARA
• Degree in Computer Science or equivalent
• Reverse engineering experience

Responsibilities:
• Keep up to date on the latest information security threats
• Create rules based on CIS benchmarks of various operating systems, to feed our product
• Understand tactics and techniques, C2 patterns and indicators of compromise
• Create multi-layered countermeasures for the Fidelis Elevate product site including NDR and cloud
• Create rules for our NDR product to detect malicious activities on the network level
• Document findings and creating blog posts related to malware analysis and detections

Diversity is important to us:

At the heart of our company is a diverse group of employees who rely on their intimate knowledge of customer requirements and a unique blend of skill and innovation to develop and deliver the best possible products and services. The company encourages the inclusion of all people and a work environment free from discrimination.

They are dedicated to the principles of equal employment and advancement of people based on their individual qualifications, skills and abilities. This commitment is supported by policies and procedures that foster a nondiscriminatory workplace. Guided by a rigorous code of ethics that is applied with integrity, these fundamental characteristics are reflected throughout our organization and are key components of the strength we deliver to our customers.

Looking forward to get in touch with you
Show more details...
via JobzMall schedule_type: Full-timesalary: 65K–90K a year
We are looking for a talented, passionate, and experienced Specialist, Security & Intelligence to join our team at Netflix. In this position, you will be responsible for developing and executing security and intelligence strategies to protect our customers, employees, and business operations.We are looking for someone with a strong security background, excellent organizational skills, and a good... understanding of the latest technologies and trends. We are looking for a talented, passionate, and experienced Specialist, Security & Intelligence to join our team at Netflix. In this position, you will be responsible for developing and executing security and intelligence strategies to protect our customers, employees, and business operations.We are looking for someone with a strong security background, excellent organizational skills, and a good... understanding of the latest technologies and trends. The ideal candidate will also have a keen eye for detail and the ability to think critically and develop effective solutions to complex problems.In this role, you will be expected to collaborate closely with internal teams and external partners to ensure the security of our data and assets. We are looking for an individual who takes initiative, is highly motivated, and is driven to make a positive impact on our business.The successful candidate will possess a Bachelor’s Degree in Security, Intelligence, or a related field, along with at least five years of experience in a security-related position. A comprehensive understanding of security protocols, compliance requirements, and threat intelligence is also required.If you are looking for an opportunity to apply your skills and expertise to a dynamic and rapidly-evolving security landscape, we invite you to apply today. We look forward to hearing from you!

Responsibilities:
Develop and execute security and intelligence strategies to protect customers, employees, and business operations.
Collaborate with internal teams and external partners to ensure the security of data and assets.
Monitor and analyze security threats and make recommendations for solutions.
Ensure compliance with security protocols and best practices.
Maintain up-to-date knowledge of the latest technologies and trends in the security and intelligence space.
Manage security projects and initiatives.
Prepare detailed reports and presentations on security and intelligence findings.
Investigate security incidents and take appropriate action.
Provide training and guidance to employees on security-related topics.
Stay abreast of industry regulations and ensure compliance.

Netflix is an Equal Opportunity Employer. We celebrate diversity and are committed to creating an inclusive environment for all employees. We do not discriminate based upon race, religion, color, national origin, sex, sexual orientation, gender identity, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics
Show more details...