Business Area: Connected Technology

Key Roles and Responsibilities:

  • Conducts advanced threat hunting and intelligence to mitigate or eliminate security threats as well as improve the company’s security posture
    • Security Risk analysis & Research
    • Security Trend analysis / Security Investigations
    • Vulnerability Assessment and Penetration Testing (VAPT)
    • Threat Vectors & Countermeasures (POC)
    • Red team and Blue team
    • Owns the end-to-end threat hunt/s findings to resolution, including to drive solutioning working with various teams.
  • Provides recommendatory input for areas that needs network or security guidance and handles unresolved or escalated security issues as well as related project work.
  • Performs deep-dive incident analysis by correlating data from various sources; determines if a critical system or data set has been impacted; advises on remediation; provides support for new analytic methods for detecting threats.
  • Researches, evaluates, designs, tests, recommends, communicates, and implements new security software or devices. Implements, enforces, communicates, and may develop network security policies or security plans for data, software applications, hardware, telecommunications, and computer installations.
  • Safeguards the network against unauthorized modification, destruction, or disclosure.
  • Responsible for analyzing network security systems and/or information systems.
  • Use scripts and various Security tools and techniques to look for
    • Security issues on our networks
    • Hunt malicious user behavior on our network
    • Attempt to penetrate on our network to test level of secureness
  • Network & Security Solutioning
    • Security Tools configuration and tuning
    • Security Automation and Dashboards configuration
    • Security Architecture and Design
  • Conduct Security Awareness Seminars
  • Provide Mentorship and guidance to Junior Security Analyst

Competencies, Skills, Knowledge, and Abilities:

  • Experience with IT Service Management (ITSM) and the ITIL Framework
  • Excellent analytical and problem-solving skills
  • Excellent organizational, communication, documentation and project management skills
  • Proven ability to manage multiple priorities and drive continuous improvement

Education, Experience and Certifications Basic Requirements:

  • Bachelor’s degree in Computer Science or related field with 5+ years of Security Operations or 8+ Information Technology experience
  • CompTia + Certifications (Network, Security, CySA)
  • ITIL Certification
  • CISSP: Certified Information Systems Security Professional
  • GSEC: SANS GIAC Security Essentials

You may send your application to