Jobs Career Advice Signup
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Nov 22, 2023
    Deadline: Not specified
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Never pay for any CBT, test or assessment as part of any recruitment process. When in doubt, contact us

    A generalist recruitment company with specialised divisions acquiring the markets leading talent in engineering, renewable energy, manufacturing, FMCG manufacturing, finance, insurance, production, construction and mining.


    Read more about this company

     

    Cyber Security Engineer

    Minimum Requirements:

    • Information Security related Certification (CISSP / CISM / GCIA).
    • Appropriate professional accreditation GCIH / Ethical Hacking (CEH)
    • Offensive Security Certified Professional (OSCP) is preferred, GPEN, advantageous.

    Experience:

    • Prior industry experience in a corporate environment (preference Financial Institution) in an IT Security role.
    • Experience in developing threat models, risk profiles, cyber-security risk and incident management, and a solid understanding of crime in the financial sector. 
    • Solid understanding and familiarity of the MITRE ATT&CK Framework.
    • Experience performing threat hunting and leading threat hunting programs. 
    • Should also have experience in performing red team exercises.
    • Experience as an IT Security consultant specializing in more than three areas: security architecture, design, development, security engineering, implementation and operation of security technologies and security project management.
    • Must have experience and be very proficient with the common tools associated with cyber security operations centres e.g. proxy technologies, log management, correlation solutions, SIEM, SOAR and common security testing tools.

    Responsibilities:

    • The Cyber Threat Hunter will collaborate with threat intelligence analysts to identify priority cyber threats, designing complex cyber hunts and the execution thereof. 
    • Cyber Hunts should be designed and executed based on prioritized complex hypothesis-based threat hunting, including the design and documentation thereof. 
    • The Cyber Threat Hunter will proactively detect threats that evade traditional security controls. 
    • Research, develop, perform, and analyse the results of proactive and reactive host and network-based investigations to determine if malicious activity exists within the environment. 
    • Building customized threat hunts specifically tailored, including, malware research, to develop detections based off numerous inputs. 
    • In addition, the role will provide expert support to the cyber security incident response team and this role has a group wide mandate. 
    • Interface with industry peers to acquire and share Cyber Hunt best-practices in the sector.

    Method of Application

    Interested and qualified? Go to Boardroom Appointments on www.careers-page.com to apply

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at Boardroom Appointments Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail