Lead the response to cybersecurity incidents, perform real-time and retrospective analysis of security events, and develop incident response plans. Conduct proactive threat hunting and digital forensic analysis to identify unknown threats and determine root causes.
Requirements
- Strong expertise in incident response, threat hunting, and forensic analysis.
- Experience with SIEM tools (e.g., Elastic, Splunk).
- Proficiency in network security, malware analysis, and log analysis.
- Familiarity with cloud security (AWS, Azure, GCP) and container security.
- Experience with cloud security tools and AI-powered security analytics (AWS Guard Duty, Azure Sentinel, Google Chronicle).
- Familiarity with AI/ML-driven anomaly detection and behavioural analysis techniques.
- Knowledge of security solutions (EDR, XDR, NDR, WAF, Proxy, Firewall, Email Security).
- Scripting and automation skills (Python, PowerShell, Bash).
- Deep understanding of MITRE ATT&CK framework, cyber kill chain, and machine learning models for cybersecurity applications.