responsible for delivering security analytics platforms for leading investment bank. Their key stakeholders are cyber teams including security response, investigations and insiderthreat and will help maintain their platforms. Role Profile Onboarding new data sources with appropriate field extractions Developing automation tools that integrate with in-house More ❯
responsible for delivering security analytics platforms for leading investment bank. Their key stakeholders are cyber teams including security response, investigations and insiderthreat and will help maintain their platforms. Role Profile Onboarding new data sources with appropriate field extractions Developing automation tools that integrate with in-house More ❯
responsible for delivering security analytics platforms for leading investment bank. Their key stakeholders are cyber teams including security response, investigations and insiderthreat and will help maintain their platforms. Role Profile Onboarding new data sources with appropriate field extractions Developing automation tools that integrate with in-house More ❯
responsible for delivering security analytics platforms for leading investment bank. Their key stakeholders are cyber teams including security response, investigations and insiderthreat and will help maintain their platforms. Role Profile Onboarding new data sources with appropriate field extractions Developing automation tools that integrate with in-house More ❯
Security Engineer Investigator, Insider Trust The Insider Trust team is looking for a Security Engineer to investigate, build and improve internal tools and systems to identify malicious activities related to insider threats. Candidates are expected to analyze and monitor internal tools, hunt for insider … skills, working closely with engineering teams, Human Resources, and Legal teams. Responsibilities Develop understanding of problem space and provide technical direction during investigations and threat hunts Develop workflows and automations to streamline signals, hunts and investigative processes Perform analysis of logs from a variety of sources (e.g., individual host … through logging and automation Minimum Qualifications Bachelor's degree in Computer Science, Engineering, or equivalent experience 4+ years of experience in Detection & Response Engineering, Threat Intelligence or similar Security Engineering role Experience conducting technical security investigations (response, forensics, log analysis) Experience interpreting information from multiple sources and working with More ❯
threats, and helping clients recover with speed and resilience. What You’ll Do: Lead and support complex cyber incident investigations involving ransomware, APTs, insiderthreats, and business email compromise. Conduct forensic acquisition and analysis of endpoint, server, and cloud environments. Provide real-time incident triage and containment recommendations. … Sysmon, NetFlow, EDR data). Familiarity with SIEM tools, EDR platforms, and scripting (Python/PowerShell preferred). Strong understanding of MITRE ATT&CK, threat actor TTPs, and IR frameworks (NIST, SANS). Excellent communication skills – written and verbal – with the ability to translate complex technical findings into business More ❯
threats, and helping clients recover with speed and resilience. What You’ll Do: Lead and support complex cyber incident investigations involving ransomware, APTs, insiderthreats, and business email compromise. Conduct forensic acquisition and analysis of endpoint, server, and cloud environments. Provide real-time incident triage and containment recommendations. … Sysmon, NetFlow, EDR data). Familiarity with SIEM tools, EDR platforms, and scripting (Python/PowerShell preferred). Strong understanding of MITRE ATT&CK, threat actor TTPs, and IR frameworks (NIST, SANS). Excellent communication skills – written and verbal – with the ability to translate complex technical findings into business More ❯
threats, and helping clients recover with speed and resilience. What You’ll Do: Lead and support complex cyber incident investigations involving ransomware, APTs, insiderthreats, and business email compromise. Conduct forensic acquisition and analysis of endpoint, server, and cloud environments. Provide real-time incident triage and containment recommendations. … Sysmon, NetFlow, EDR data). Familiarity with SIEM tools, EDR platforms, and scripting (Python/PowerShell preferred). Strong understanding of MITRE ATT&CK, threat actor TTPs, and IR frameworks (NIST, SANS). Excellent communication skills – written and verbal – with the ability to translate complex technical findings into business More ❯