¡Activa las notificaciones laborales por email!

Sales Support

International Flavors & Fragrances

Madrid

Presencial

EUR 50.000 - 90.000

Jornada completa

Hace 30+ días

Mejora tus posibilidades de llegar a la entrevista

Elabora un currículum adaptado a la vacante para tener más posibilidades de triunfar.

Descripción de la vacante

Ein marktführendes Unternehmen im Bereich der Bedrohungserkennung sucht einen erfahrenen Cybersecurity-Experten. In dieser spannenden Rolle sind Sie verantwortlich für die Identifizierung und Analyse fortgeschrittener Bedrohungen sowie die Entwicklung von Erkennungsregeln für Sicherheitsüberwachungssysteme. Sie werden eng mit dem Incident Response-Team zusammenarbeiten, um während aktiver Cybervorfälle umsetzbare Bedrohungsinformationen bereitzustellen. Wenn Sie leidenschaftlich an Informationssicherheit interessiert sind und über umfangreiche Erfahrung im Threat Hunting verfügen, ist dies die perfekte Gelegenheit für Sie, einen bedeutenden Einfluss in der Branche zu haben.

Formación

  • 8+ Jahre Erfahrung in Threat Hunting und EDR-Technologie.
  • Fähigkeit zur Analyse von Bedrohungen und zur Entwicklung von Erkennungsregeln.

Responsabilidades

  • Verwendung von Bedrohungsinformationen zur Erkennung verdächtiger Aktivitäten.
  • Durchführung tiefgehender Analysen von Anomalien und Systemverhalten.

Conocimientos

Threat Hunting
Cyber Threat Intelligence (CTI)
Incident Response
Behavioral Analysis
TCP/IP Networks
Problem-Solving Skills
Customer Focus

Educación

University Degree

Herramientas

EDR Technology
SIEM Technologies
Forensic Analysis Tools
CTI Tools

Descripción del empleo

At One e Security, we are a market-leading specialist in Threat Detection and Digital Forensics & Incident Response (DFIR). Our commitment to excellence, innovation, and passion drives everything we do. We’re looking for a top-tier, fully remote cybersecurity professional with 5+ years of experience in Threat Hunting and Cyber Threat Intelligence (CTI). If you have a sharp eye for advanced threats and hands-on expertise in incident response, join us and make an impact!

Main Responsibilities

  1. Use threat intelligence and behavioral analysis to find potential anomalies and suspicious activities that automated security systems might miss.
  2. Actively search for hidden threats and indicators of compromise (IOCs) across the network, endpoints, and systems, using both known and unknown attack techniques.
  3. Operation of Threat Hunting tools such as EDRs, XDRs, SIEMs, etc., including the creation and execution of hunts as well as analysis of results.
  4. Conduct in-depth analysis of unusual patterns, system behaviors, and network traffic to uncover advanced threats, including zero-day attacks, APTs, insider threats, and advanced malware.
  5. Develop and refine detection rules and use cases for security monitoring systems (e.g., SIEM, IDS / IPS, EDR solutions) based on evolving attack techniques.
  6. Generate reports for the Clients, detailing discovered threats, the severity of risks, and recommended actions for remediation.
  7. Identify trends, tactics, techniques, and procedures (TTPs) used by cyber adversaries.
  8. Perform deep analysis of indicators of compromise (IOCs) and attack signatures.
  9. Gather and aggregate information from various sources, such as open-source intelligence (OSINT), dark web monitoring, threat feeds, and other threat-sharing platforms.
  10. Work closely and provide actionable threat intelligence to support Incident Response team during active cyber incidents and Threat Hunting team during active threat detection.
  11. Client management.
  12. Project management.

Requirements

  1. University degree is desirable but not required.
  2. 8+ years professional experience in Threat Hunting, EDR technology, SOC, Blue team, incident response.
  3. Have a solid understanding of the information security threat landscape.
  4. Knowledge of the threats most commonly used by attackers.
  5. Knowledge of analysis platforms and query languages.
  6. Knowledge of the most commonly used SIEM technologies on the market.
  7. Understanding of TCP / IP networks, base protocols for the development and analysis of IDS / PCAPs rules, analysis of logs and DNS / HTTP packets as well as browsing logs.
  8. Familiarity with security frameworks such as MITRE, ENISA, CCN.
  9. Experience with CTI tools: Virus Total, Open CTI, Maltego.
  10. Forensic analysis tools such as Volatility or Regripper.
  11. Management of services and / or projects.
  12. Customer focus and skills to lead meetings, project presentations.
  13. A plus: experience in team management.
  14. Ability to work in a team.
  15. Demonstrate innovative and creative thinking as well as problem-solving skills.
  16. Languages: Fluent in English and Spanish.
Consigue la evaluación confidencial y gratuita de tu currículum.
o arrastra un archivo en formato PDF, DOC, DOCX, ODT o PAGES de hasta 5 MB.