...investigate and respond to the most advanced cyber-attacks. With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely on the Vectra AI to move at the speed and scale of hybrid attackers. For more information, visit...
...concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management, etc.
~ Utilize and incorporate MITRE ATTACK Framework and Cyber Kill Chain
~ Working knowledge of security technologies such as: SIEM, EDR, FW, AD, IPS, SOAR, WAF, CTI,...
...investigate and respond to the most advanced cyber-attacks. With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely on the Vectra AI to move at the speed and scale of hybrid attackers. For more information, visit...
...complex technical concepts to non-technical stakeholders.
~Proven experience in managing third-party vendors.
~Familiarity with the MITRE ATT&CK framework.
~Experience in incident response within a cloud-based environment.
~Demonstrated capability to work both independently...
...to, OWASP Top 10.
~ Knowledge of regulatory guidelines and standards such as GDPR, PCI-DSS, CIS, NIST etc
~ Familiarity with MITRE ATT&CK Enterprise Matrix and MITRE D3FEND
Desired Experience and Qualifications
Experience in the Telecoms industry is...
...investigate and respond to the most advanced cyber-attacks. With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely on the Vectra AI to move at the speed and scale of hybrid attackers. For more information, visit...
...investigate and respond to the most advanced cyber-attacks. With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely on the Vectra AI to move at the speed and scale of hybrid attackers. For more information, visit...
...such as GCP, AWS, or Azure
Nice to Have
Experience building security products, especially Container Security
Knowledge of MITRE ATT&CK Framework
Experience with AI / ML
Experience with one or more of the following areas and technologies: networking, network...
...incident response, threat hunting, or similar
Understanding of current security threats and other challenges, as well as frameworks like MITRE ATT&CK
Familiarity with common enterprise security tools, specifically SIEM, EDR, and NSM tools
Experience with scripting,...
...information technology or security operations.
~ Proficiency in DevSecOps and agile workflows.
~ Familiarity with OWASP, CVSS, and the MITRE ATT&CK framework.
~ Understanding of containerization and orchestration technologies.
Are you ready to make your mark in a...
...general practices
~ Experience with DevSecOps and agile workflows, including Scrum and Kanban
~ Understanding of OWASP, CVSS, the MITRE ATT&CK framework and the software development lifecycle (SLDC)
~ Understanding of containers (e.g., Docker) and container orchestration...
...Practical understanding of common attacks and how they work.
Knowledge of adversary tactics, techniques, and procedures (TTPs) and MITRE ATT&CK principles
Hands-on experience with data analysis, modeling, and correlation at scale
Operating systems internals and forensics...
...consortia, or personal networks to fill intelligence gaps
Preferred Qualifications:
● Knowledge of the Incident Response process and the MITRE ATT&CK framework
● Deep knowledge in at least one or more of the following threat categories: Regional Threat Groups, Emerging...
...Experience in SOAR, technologies, and automation of tasks
Experience with EDR and NDR technologies
A strong understanding of the MITRE ATT&CK knowledge base
TECHNICAL SKILLS:
Deep understanding of cyber security operations and technologies
Strong ability to...
...leveraging coding for automation, alert enrichment and detections.
Knowledge of adversary tactics, techniques, and procedures (TTPs) and MITRE ATT&CK principles
Hands-on experience with data analysis, modeling, and correlation at scale
Operating systems internals and...