drjobs DFIR Threat Hunting Researcher العربية

DFIR Threat Hunting Researcher

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Petah Tikva - Israel

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

What will you do:

CyberArk the global leader in Identity Security is looking for a skilled and passionate DFIR & Threat Hunting Researcher to join its Global Information Security Team. In this role you will conduct digital forensics and threathunting activities across CyberArks global network endpoints and cloud environments. You will also research and develop new methods and tools to enhance the detection and response capabilities of the CyberArk Information Security team.

Digital Forensics and Incident Response (DFIR):

  • Perform digital forensics analysis on various types of evidence such as disk memory network and cloud artifacts (AWS advantage).
  • Support incident response efforts by providing technical expertise containment eradication and recovery guidance.
  • Maintain and operate forensic tools and platforms ensuring they are uptodate and reliable.
  • Document and report on forensic findings and recommendations following the established procedures and standards.

Threat Hunting:

  • Proactively hunt for malicious activity and indicators of compromise across CyberArks network endpoints and cloud environments using various data sources and analytical techniques.
  • Develop and refine custom threathunting hypotheses queries and dashboards based on the latest threat intelligence and trends.
  • Collaborate with the SOC team to validate escalate and respond to identified threats.

Research and Development:

  • Research emerging threats attack vectors threat actors ATPs security technologies and CyberArk products and share insights and best practices with the team and the broader security community.
  • Develop and improve tools scripts correlation alerts and automation to enhance the SOC teams DFIR and threathunting capabilities.

    LICR1


    Qualifications :

    What you need to succeed:

    • Proven 3 years) experience in digital forensics and incident response preferably in a tech company or a security consulting firm.
    • Handson experience with industry standard forensic tools and platforms.
    • Handson experience with threat hunting tools query languages and platforms such as ELK Splunk QRadar KQL SQL etc.
    • Strong knowledge of network protocols operating systems malware analysis and cloud security.
    • Ability to automate tasks using a scripting language such as Python & JS.
    • Excellent communication and interpersonal skills.
    • Excellent proficiency in English both written and verbal is a must.
    • Curious and creative mindset with a passion for learning and solving complex problems.
    • Ability to work independently and collaboratively in a fastpaced dynamic environment and with a multiregion team.

    How will you stand out from the crowd:

    • GCFE GCFA GNFA GCTI OSCP or equivalent.


    Remote Work :

    No


    Employment Type :

    Fulltime

    Employment Type

    Full-time

    Company Industry

    About Company

    Report This Job
    Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.