Ready to join Accenture’s team of empowered people? We’re looking for candidates with the following skills and experience for this role. Do you fit the profile? If you do, we’d love to hear from you!
In adherence to Accenture’s process of Identity Verification, your resume or CV must include your photo to ensure the accuracy of your application.
Who we are:
Accenture in the Philippines is a pioneer in Accenture’s global delivery network. Over the past 30 years, we have expanded our capabilities to become a powerhouse company providing end-to-end technology and business services. As part of Accenture’s global footprint in over 120 countries, covering 40-plus industries, we have been working with the biggest companies in the country and around the globe.
Innovation, a constant at Accenture, enables us to find new ways to stay ahead of our clients’ challenges. Our inclusive, diverse, and strong culture of equality helps us constantly drive innovation in the workplace. By combining our industry expertise and the deep skills of our people with the latest technologies and our uncompromising high-performance standards, we help organizations grow their business and succeed in the digital age.
What’s in it for you?
At Accenture you will work on meaningful and innovative projects, powered by the latest technologies. You’ll be immersed in industry best practices such as event-driven architectures and domain-driven designs. Accenture will continually invest in your learning and growth. Youll work with Accenture’s certified practitioners, and Accenture will support you in growing your own tech stack and certifications.
A Threat Hunter is a highly skilled member of ATCP Security Crisis and Incident Response (CIR) Team, entrusted with the crucial responsibility of proactively identifying and mitigating security threats within an organizations network and systems. They employ a combination of manual and automated techniques to detect, analyze, and investigate potential security incidents that may have evaded traditional security controls.
As part of their role, a Threat Hunter excels in the following types of Threat Hunting in the clients environment:
Threat Intelligence Driven: Leveraging threat intelligence feeds and external sources, they actively search for indicators of compromise (IoCs) and emerging threat patterns to detect and neutralize potential security risks.
Security Incident Driven: They swiftly respond to security incidents, conducting thorough investigations to understand the extent of the compromise, its impact, and the underlying root causes. This enables them to develop effective mitigation strategies.
Hypothesis Driven: Utilizing their expertise and knowledge of attack vectors, they formulate hypotheses about potential threats and then systematically gather and analyze evidence to confirm or refute those hypotheses, ensuring a comprehensive
Threat Hunting approach.
Compromise Assessment via Threat Hunting: Through continuous monitoring and proactive hunting, they assess the environment for signs of compromise, identify any ongoing breaches, and initiate the appropriate response actions.
In addition to their primary Threat Hunting duties, Threat Hunter takes on the following key responsibilities:
In-depth Investigations: They conduct detailed investigations into potential security incidents, employing advanced techniques to determine the nature and extent of the threat. This includes analyzing logs, network traffic, system artifacts, and other relevant data sources.
Collaboration and Coordination: They coordinate and collaborate with various stakeholders, including incident response teams, IT personnel, and management, to address high-priority and high-severity findings. Effective communication and teamwork are essential for successful threat mitigation.
Comprehensive Reporting: They prepare comprehensive reports that document investigation details, findings, and recommended remediation steps. These reports provide valuable insights to stakeholders and aid in the development of proactive security measures.
Job Qualifications:
Proficient in Threat Hunting Methodologies: Possess a deep understanding of various Threat Hunting techniques, including manual log analysis, behavioral analytics, data correlation, and anomaly detection
Strong Incident Response Knowledge: Well-versed in incident response processes and procedures
Capable of conducting thorough investigations, analyzing collected data, and determining the scope, impact, and root cause of security incidents
Skilled at collaborating with incident response teams to provide timely remediation recommendations
Familiarity with MITRE ATT&CK Framework: Knowledgeable about the MITRE ATT&CK framework, including its various tactics, techniques, and procedures (TTPs)
Able to leverage the framework to identify and categorize adversary behaviors and map them to relevant security controls
Expertise in Digital Forensics: Proficient in conducting digital forensics investigations on both host systems and network infrastructures
Skilled at analyzing digital evidence, performing memory, disk, and network forensics, and extracting relevant artifacts to understand the nature of security incident
Competent in Static and Dynamic Malware Analysis: Capable of analyzing malicious software (malware) using both static and dynamic analysis techniques
Able to analyze malware samples to understand their functionalities, persistence mechanisms, and potential impact on systems
Strong Understanding of Networking, Operating Systems, and Security Fundamentals
Possess a solid foundation in networking protocols, operating systems (Windows and Linux), and core security concepts
Understand how different components interact within an IT environment and their potential security implications
Knowledge of Various Security Technologies: Well-versed in different security technologies such as SIEM (Security Information and Event Management), endpoint security solutions, network security devices, and email security systems
Familiar with their functionalities, deployment, and monitoring practices
Certification is a Plus
Possess relevant certifications in the field of cybersecurity, such as SANS GCFA (GIAC Certified Forensic Analyst), GNFA (GIAC Network Forensic Analyst), or other industry-recognized certifications
These certifications validate expertise and demonstrate a commitment to professional development.
Additional Information:
Should have minimum 3 years of experience in Threat Hunting
Must be amenable to work in day schedule at Cubao Site, with hybrid work set up
What we believe:
All our leaders are committed to building a better, stronger and more durable company for future generations to create positive, long-lasting change. Inclusion and diversity are fundamental to our culture and core values. Our rich diversity makes us more innovative and creative, which helps us better serve our clients and our communities.
Our position as partner to many of the world’s leading businesses, organizations and governments affords us both an extraordinary opportunity and a tremendous responsibility to make a difference. Sustainability is one of our greatest responsibilities, which we embed it into everything we do and for everyone we work with.
Accenture is committed to providing equal employment opportunities for persons with disabilities. Please let your recruiter know if you require reasonable accommodation to enable your participation in the recruitment process, they will be happy to assist you.
What’s in it for you?
Competitive Total Rewards (Compensation, Performance Bonus, 13th Month Pay, Day 1 HMO & Life Insurance Coverage)
Expanded maternity leave up to 120 days*
Expanded paternity leave up to 30 days*
Flexible Working Arrangements*
Healthy and Encouraging Work Environment
Company-sponsored trainings like upskilling and certification
Employee Stock Purchase Pan
Loyalty and Christmas Gift
Inclusion and Diversity Benefits
Terms & Conditions apply
Equal employment Opportunity Statement:
All employment decisions shall be made without regard to age, race, creed, color, religion, gender, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law.
Job candidates will not be obligated to disclose sealed or expunged records of conviction or arrest as part of the hiring process.
Accenture is committed to providing veteran employment opportunities to our service men and women.
Please read Accenture’s Recruiting and Hiring Statement for more information on how we process your data during the Recruiting and Hiring process.
IMPORTANT REMINDER: We appreciate your interest in applying with Accenture. Please ensure to complete your profile and accomplish all required information in Workday within the next 24 hours, in order for us to start processing your application. You may access Workday by clicking the “Apply Now” button or refer to the link sent via SMS or email.