Informacje o stanowisku
Our client is a financial services firm that has been delivering innovative investment solutions for years. Specializing in creating personalized managed account platforms for institutional capital allocators, it offers top-tier services including better control, transparency, and cost optimization.
Requirements:
- Undergraduate degree in Computer Science, Information Technology, or a related field - or equivalent in academics and/or experience.
- A minimum of 5 years of prior experience in incident response or CSIRT is preferred.
- Practical experience in computer forensics, host and network-based security monitoring, traffic and log analysis.
- Experience with SOC practice management
- Advanced Hands-on experience with building Cyber security SIEM use-cases
- Advanced Hands-on experience with threat hunting
- Hands-on experience with Cyber Security Forensics
- Completion of relevant certifications such as GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Examiner (GCFE), EnCase Certified Examiner (EnCE), CCFP ISC(2), or similar.
- Excellent understanding in offensive cybersecurity
- Strong leadership, previous experience as a Tech Lead is preferred.
- English is required as you will be collaborating with partners Worldwide
We offer:
- Full-time contract of employment;
- City-center locations close to main railway station and flexible working arrangement;
- Flexible benefits package, including life and medical insurance, health care programs, fitness discount programs, employee assistance program and others;
- Pension scheme;
- Co-founded language courses and other learning opportunities;
Responsibilities:
- Lead the SOC team and manage computer forensic investigations and cyber incident response, including log analysis, malware triage.
- Demonstrate in-depth technical knowledge in the areas of operating system security, network security and malware analysis.
- Write technical reports based on findings and, if required, give evidence in court as an expert witness.
- Process the threat intelligence information related to fund management entities and assessing the impact of intelligence on company
- Demonstrate mastery of the Azure security stack including Azure Sentinel and other related security tools and services.
- Continuously monitor and improve security monitoring tools and processes to ensure the effectiveness of threat detection and response.
- Disseminate threat intelligence information across the enterprise at various levels - operational, management and strategic.
- Communicate effectively at various levels and audiences and coordinate with other teams such as HR, Legal to aid with security forensics.
Praca WrocławWrocław - Oferty pracy w okolicznych lokalizacjach