As a consultant – Incident Response, you live and breathe blue team operations. Your technical expertise in endpoint and network threat detection and defence is complemented by your integrity and passion for cyber security and technology.
You work well in a team of highly motivated and skilled blue teamers, but you can also achieve your work independently in different engagements and scenarios. You enjoy taking on new challenges in a fast-paced and dynamic working environment. You are a team player who is always willing to help where required, with a humble and positive attitude.
Responsibilities
Key Responsibilities
At least 1-3 years of experience in the following activities
Serve as technical expert on active incident response engagements across different IR Retainer customers
Achieve tasks independently within the team before initial 6 months
Execute threat hunting activities in support of incident response and proactive environment assessments
Carry out host-based assessments using EDR tools and network assessments utilising full packet data to determine the extent and scope of possible compromise
Perform host and/or network-based forensics across Windows, Mac, and Linux platforms.
Execute digital forensic investigations supporting cyber incident response engagements
Contribute to process documentation and continuous service improvement activities
Flexible schedule that is open to changing situations and opportunities
Learn to produce detailed reports and technical briefs
Explain technical findings in a manner that can be easily understood by technical and non-technical staff
You must be a team player, with a humble and approachable nature who is willing to go the extra mile.
Technical Skills
Strong understanding of blue team operations and threat hunting
Sound understanding of network protocols, TCP/IP etc.
Sound understanding of Microsoft Windows
Sound understanding of Linux and/or OSX is a plus
Ability to learn forensic skills across multiple operating systems
Basic understanding of network analysis tools like Bro/Zeek, Rita or Suricata
Ability to perform analysis of system and network devices logs
Basic understanding of the capabilities of static and dynamic malware analysis
Sound understanding of enterprise systems, technologies, and infrastructure
Strong understanding of current threats, vulnerabilities, and attack trends
Sound understanding of ATT&CK framework
Good organisational skills, ability to prioritise, and ability to learn to work independently before the end of the trial period
Ability to learn quickly and apply the learnings into the job on a day-to-day basis
Qualifications
Certifications/Qualifications/Skills
Good attention to detail and reporting accuracy
English language skills, both spoken and written
GIAC Certified in a minimum of one discipline: GNFA, GCIH, GCIA, GCFE, GCFA, GDAT, etc Or equivalent (eLearnSecurity .etc)
At least previous basic experience working with EDR tools and threat hunting tools
Searching, interviewing and hiring are all part of the professional life. The TALENTMATE Portal idea is to fill and help professionals doing one of them by bringing together the requisites under One Roof. Whether you're hunting for your Next Job Opportunity or Looking for Potential Employers, we're here to lend you a Helping Hand.
Disclaimer: talentmate.com is only a platform to bring jobseekers & employers together.
Applicants
are
advised to research the bonafides of the prospective employer independently. We do NOT
endorse any
requests for money payments and strictly advice against sharing personal or bank related
information. We
also recommend you visit Security Advice for more information. If you suspect any fraud
or
malpractice,
email us at abuse@talentmate.com.
You have successfully saved for this job. Please check
saved
jobs
list
Applied
You have successfully applied for this job. Please check
applied
jobs list
Do you want to share the
link?
Please click any of the below options to share the job
details.
Report this job
Success
Successfully updated
Success
Successfully updated
Thank you
Reported Successfully.
Copied
This job link has been copied to clipboard!
Apply Job
Upload your Profile Picture
Accepted Formats: jpg, png
Upto 2MB in size
Your application for Consultant - Incident Response CPX
has been successfully submitted!
To increase your chances of getting shortlisted, we recommend completing your profile.
Employers prioritize candidates with full profiles, and a completed profile could set you apart in the
selection process.
Why complete your profile?
Higher Visibility: Complete profiles are more likely to be viewed by employers.
Better Match: Showcase your skills and experience to improve your fit.
Stand Out: Highlight your full potential to make a stronger impression.
Complete your profile now to give your application the best chance!