To be part of the Cyber Threat team, serve as a Tier 3 SME, and mentor the SOC team. This role requires continuous detection, analysis, investigation, response, and mitigation of advanced threats before they affect the bank's IT infrastructure, utilizing a proven and documented cyber threat model, e.g., Mitre Attack Framework.
Preferred Level Of Experience (by Years/Function/Industry)
- 4 - 5 years of information security experience
- 1 - 2 years supporting incident response and/or investigations
- Experience reviewing and assessing logs for anomalous activity indicating threats
- Knowledge of threat actor attack methods and tracking their developments
- Experience with Threat Models such as Cyber Kill Chain & Mitre ATT&CK
- Ability to convey complex information clearly and succinctly
- Exceptional attention to detail
Other Skills Required
- Strong technical writing skills
- Extensive experience with analytical tradecraft
- Thorough understanding of cybersecurity principles
- Ability to work independently and build relationships
- Efficient research methodologies
- Ability to relate technical threats to business risks
- Proficiency with scripting and programming languages (e.g., Python, PowerShell, Java, NodeJS, Perl)
- Strong communication and writing skills for reporting and analysis
Key Responsibilities
Solution
- Maintain SIEM solutions like Splunk, Imperva, etc., ensuring compliance with patch and obsolescence frameworks
- Ensure complete and accurate log and event data from all relevant devices
- Produce monthly SIEM health reports
Hunting
- Perform threat hunting using industry-accepted methodologies (e.g., hypothesis-driven, IOC-driven, machine learning)
- Analyze host, network traffic, IDS/IPS/DLP events, packet captures, firewall logs, and other security solutions
- Provide forensic analysis of network packets, DNS, proxy, NetFlow, malware, host security, and application logs
- Identify infrastructure gaps by mimicking attacker behaviors
- Perform offensive validation of identified TTPs
Detection & Response
- Develop SIEM use cases based on the Mitre Attack framework
- Onboard use cases to SOC for 24/7 monitoring and response
- Update IOC lists in threat prevention solutions
- Improve detection processes for efficiency
- Create dashboards and reports to identify threats and anomalies
- Assist in designing and implementing new security technologies