• Home
  • Jobs
  • Companies & Ventures
  • Economic Snapshots
  • GreenSee
  • Travel & Leisure
Add listing
Sign in or Register
Add listing

Threat Hunter

Dell Technologies

  • Apply on company site
  • Details
  • Company
  • prev
  • next
  • Share
  • Bookmark
  • prev
  • next
Description

The Threat Hunter is focused on protecting our Taegis ManagedXDR Elite customers by using a variety of tools and techniques to gather, classify, enrich, and tune suspicious and malicious activity. To accomplish this, the Triage Hunter must be able to research, evaluate, and stay current on emerging tools, techniques, and technologies. They are expected to act as a mentor, working side by-side with other personnel in an advisory, support, and training role to enhance security effectiveness & efficiency of the Security Operations Center (SOC). They will be leading security thought & innovation both internal to Secureworks and across the industry.

Role Responsibilities:

  • Review and Triage alerts from various platforms reporting into Taegis and determine whether they are benign or warrant further investigation.
  • Create countermeasure tuning requests.
  • Conduct Threat Hunts across the ManagedXDR Elite customer base using a variety of tools and methodologies.
  • Contributes to the development of new techniques and plans within area of expertise.
  • Continually learn and develop through awareness and study of information security events, techniques, and threat actor TTP’s.
  • Assumes ownership in problem resolution striving for customer satisfaction.
  • Proactively work to document and minimize operational and client impacting issues that arise during day-to-day operations. Develop  innovative and creative recommendations that improve customer outcomes.
  • Provides mentorship to teammates guiding their career development.
  • Actively contribute to internal projects per assignments received from the manager in alignment with own knowledge, skills, and workload.
  • Capable of cross-organizational teaming in support of business advancement.

Knowledge requirements

  • Thorough understanding of Threat Hunting methodologies.
  • Familiarity of Python, python data science modules and Jupyter Notebooks.
  • Knowledge of adversarial attack methods and technologies.
  • Knowledge and application of endpoint and network security.
  • In-depth disciplinary knowledge combined with advanced experience.
  • Advanced understanding of Security Devices.
  • Advanced understanding of Application, Network & Operating System Security vulnerabilities.
  • Preferred: GCIA, GCFA, OSCP or equivalent.

Skills & Competencies

  • 5-8 years of relevant experience or equivalent combination of education and work experience.
  • BA/BS in engineering/computer science preferred.
  • Excellent written and verbal communication skills with both technical and non-technical individuals.
  • Self-Initiative and ability to successfully manage your time to meet the various demands of the role with minimal leadership oversight.
Vacancy type
  • Full time
Industry
  • database
Job start date
  • 30/09/2024
Location
  • Bucharest, Romania

    Get Directions

You May Also Be Interested In

Product Manager Save & Invest

  • WOW Business Consulting
  • business
  • Quick view
  • Bookmark
  • Add to comparison
  • Brussels, Belgium

Customer Support Representative

  • Eaton
  • Customer Support
  • Quick view
  • Bookmark
  • Add to comparison
  • Belgrade, Serbia

Quotation Engineer

  • Eaton
  • Engineering
  • Quick view
  • Bookmark
  • Add to comparison
  • Serbia

Facebook Instagram Linkedin Tiktok Link

Sitemap

Menu
  • Home
  • Jobs
  • Companies & Ventures
  • Economic Snapshots
  • GreenSee
  • Travel & Leisure

About Us

Menu
  • About
  • Contact Us
  • Editorial Policy
  • Environmental Responsibility
  • Cookie Policy (EU)

Join our community

Get weekly news about career opportunities in South East Europe. Sign up now and don't miss out!

© All Rights Reserved. Developed by: Tivius

Cart

  • Facebook
  • X
  • WhatsApp
  • LinkedIn
  • Reddit
  • Copy link
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}