Embrace the challenge of maintaining robust digital security, driving operational excellence, and implementing cutting-edge solutions in cybersecurity.
As a Senior Threat Detection Engineer in CTC, you will contribute significantly to safeguarding the organization's digital assets and infrastructure by proactively detecting, assessing, and responding to threats, vulnerabilities, and security incidents. You will regularly collaborate with cross-functional teams to develop a coordinated approach to security, ensuring the integrity, confidentiality, and availability of sensitive data and systems. You will apply advanced analytical, technical, and problem-solving skills to enable operational excellence and implement innovative solutions to address complex security challenges. By staying current with industry best practices, policies, and procedures, you will contribute to maintaining a secure digital environment and driving continuous improvement in the firm.
Job responsibilities
• Execute and influence the design of comprehensive security strategies, policies, and procedures to enhance threat detection capabilities and protect the organization's digital assets and infrastructure from cybersecurity threats.
• Proactively monitor and analyze complex data and systems to identify indicators of vulnerabilities and compromises, utilizing advanced tools and techniques to detect anomalies and contribute to the development of strategies for security investigation, threat mitigation, and incident response.
• Collaborate with cross-functional teams to ensure a coordinated approach to security, sharing insights, and promoting best practices across the organization.
• Evaluate and enhance the organization's security posture by staying current with industry trends, emerging threats, and regulatory requirements, driving innovation and process improvements.
Required qualifications, capabilities, and skills
• 5+ years of experience in Security Operations, Cybersecurity Consulting, Incident Response, Computer Network Operations (CNO), Computer Network Defense (CND) or equivalent roles in a large, mission-critical environment.
• Experience with the creation and tuning of alerting rules from a SIEM and other devices in response to changing threats.
• Ability to research TTPs and develop high fidelity detections in various tools/languages including but not limited to: Splunk, CrowdStrike, Azure Sentinel, Suricata, Snort.
• Ability to use data science and analytical skills to identify anomalies over large datasets.
• Excellent written and verbal communication skills to describe security event details and technical analysis with audiences within the cybersecurity organization and other technology groups.
• Experience with threat hunting on a large, enterprise network both as an individual and leading hunting exercises with other team members.
• Experience with log analysis from multiple sources (e.g. firewall, IDS, endpoints) to identify and investigate security events and anomalies.
• Experience with malware analysis (both static and dynamic), binary triage, and file format analysis.
• Experience with packet-level analysis (e.g., Wireshark, tcpdump, tshark) and knowledge of TCP/IP protocols (OSI layers 3-7) for investigating network traffic.
• Experience using scripting languages (Python, Powershell, Bash, etc.) to parse machine-generated data, interact with REST APIs and automate repetitive tasks.
• BA/BS degree or equivalent qualification.