We have an exciting and rewarding opportunity for you to take your cyber security career to the next level.
As a Security Operations Vice President in Cybersecurity Operations Attack Analysis you will contribute significantly to safeguarding the organization's digital assets and infrastructure by proactively detecting, assessing, and responding to threats, vulnerabilities, and security incidents. You will regularly collaborate with cross-functional teams to develop a coordinated approach to security, ensuring the integrity, confidentiality, and availability of sensitive data and systems. You will apply advanced analytical, technical, and problem-solving skills to enable operational excellence and implement innovative solutions to address complex security challenges. By staying current with industry best practices, policies, and procedures, you will contribute to maintaining a secure digital environment and driving continuous improvement in the firm.
Job responsibilities
Execute and influence the design of comprehensive security strategies, policies, and procedures to enhance threat detection capabilities and protect the organization's digital assets and infrastructure from cybersecurity threatsProactively monitor and analyze complex data and systems to identify indicators of vulnerabilities and compromises, utilizing advanced tools and techniques to detect anomalies and contribute to the development of strategies for security investigation, threat mitigation, and incident responseCollaborate with cross-functional teams to ensure a coordinated approach to security, sharing insights, and promoting best practices across the organizationEvaluate and enhance the organization's security posture by staying current with industry trends, emerging threats, and regulatory requirements, driving innovation and process improvementsExecute large scale threat hunting operations, utilizing threat intelligence feeds and other relevant inputs.Required qualifications, capabilities, and skills
5+ years of experience in cybersecurity operations, with a focus on threat detection, incident response, and security infrastructure managementDemonstrated expertise in multiple security domains, including network security, malware analysis, threat hunting, and security architecture and design, with proficiency in using Security Information and Event Management (SIEM) tools and advanced analytics techniques.Experience with analyzing Endpoint Detection & Response (EDR) telemetry and excellent knowledge of operating system internals (Windows, Linux, macOS).Advanced knowledge of network and infrastructure configuration/security, including experience in designing and implementing security solutions for on-prem, cloud, or hybrid environmentsExcellent written and verbal communication skills with the ability to describe security event details and technical analysis to audiences within the cybersecurity organization and other technology groups.Strong understanding of attack techniques and how these are employed by threat actors to compromise systems and networks.Preferred qualifications, capabilities, and skills
Threat hunting in a large, enterprise network both as an individual and as a member of a global threat hunting team.Developing and applying complex regular expressions for precise data extraction and pattern matching.Utilizing command line tools within both Windows and Linux environments.Experience in using scripting languages such as Python, PowerShell, and Bash to parse machine-generated data, interact with REST APIs, and automate repetitive tasks.