CYPFER ยท 5 months ago
Security Analyst - Threat Hunter
CYPFER is a global leader in cybersecurity, specializing in ransomware post-breach remediation and first response to cyber-attacks. They are seeking a Security Analyst - Threat Hunter who will create detection engineering solutions, analyze tactics and malware, and collaborate with various teams to enhance cybersecurity measures.
Cyber Security
Responsibilities
Create detection engineering solutions to proactively identify and mitigate sophisticated threat actors (APTs/UNCs) and insider threats
Analyze, research and reverse engineer Tactics Techniques and Procedures (TTPs) and malware samples to create detections based on industry leading frameworks such as MITRE ATT&CK
Develop, plan, lead and participate in Purple Team Exercises focusing on and discovering and mitigating emerging threats
Innovate and create novel solutions including User Behavior Analytics (UBA) models by leveraging Data Science and Machine Learning (ML), bringing cybersecurity and data science closer
Collaborate and foster relationships with multiple teams including Adversary Emulation (Red Team), Data Science, Threat Intelligence, Security Operation Centre (SOC) and Digital Forensics and Incident Response (DFIR) to drive pragmatic cyber security improvement
Work closely with our dedicated Development team to create and enhance our threat hunting in-house developed products
Develop, implement, and refine our defensive tradecraft and tooling
Provide bespoke advisory and consultation services to senior executive management and perform as a cyber security SME for emerging threats and investigations
Work and utilize vast data sources, data lakes and security vendor solutions
In conjunction with other members of the Global Security group, you would ensure the ongoing enhancement of the threat hunting methodologies and overall strategy to detect and alert of cyber threats
Qualification
Required
5+ years of Cyber Security operations experience preferably comprised of both defensive and offensive roles
Familiarization with the cyber security Kill Chain phases and MITRE ATT&CK framework TTPs
Knowledge of offensive security tools, techniques, procedures and security domains focusing on operational security
Solid grasp of cyber security controls/products including both endpoint, network, application, and infrastructure
Knowledge of current regional and global threat landscape
Strong knowledge of Python
Preferred
Hands-on experience in malware analysis, reverse engineering, and security research
Prior experience conducting blue/purple team exercises or penetration testing
Digital Forensics skills including memory/network/OS/disk forensics
Defensive oriented certification such as GIAC GREM, GCFA or other reputable, technical, and defensive/offensive focused certification
Cloud knowledge and expertise of leading cloud providers (AWS, GCP, Azure)
Programming languages such as C++/C#/JavaScript/Assembly
Hands-on experience working with LLM and RAG technologies