DESKRIPSI PEKERJAAN
Proactive Threat Hunting: Use advanced techniques (e.g., behavioural analysis, anomaly detection) to hunt for undetected malicious activity across endpoints, networks, and cloud environments.
Hypothesis Development: Create and test hypotheses based on threat intelligence, MITRE ATT&CK framework, and system behaviours.
Tool Utilization: Leverage SIEMs (e.g., Splunk, ELK), EDR (e.g., CrowdStrike, SentinelOne), and other telemetry tools to investigate suspicious activity.
Threat Intelligence Integration: Correlate internal data with external intelligence feeds to identify emerging threats.
Detection Engineering: Help build new detections, playbooks, and use cases to improve overall detection coverage.
Reporting & Documentation: Document findings, threat hunt outcomes, and help develop reports for stakeholders.
REQUIREMENT
Technical Skills:
Strong knowledge of operating systems (Windows, Linux, macOS).
Deep understanding of network protocols,
Experience with threat frameworks like MITRE ATT&CK, Cyber Kill Chain.
Familiarity with scripting languages (equivalent Python, PowerShell) for automation and data analysis.
Knowledge of cloud security (AWS, Azure, GCP) is often preferred.
DETAIL LOWONGAN
- Umur -
- Min GPA -
- Min. Qualification S1/D4
- Min Experience Staff