Apply📍 Ireland
🧭 Full-Time
💸 100000 - 110000 EUR per year
🔍 Cybersecurity
- 4+ years experience in a SOC, Incident Response, or Forensics role.
- Excellent verbal and written skills to explain complex alerts in simple terms.
- Proven mentoring experience with junior team members.
- Self-guided study or Bachelor's degree in IT, Computer Science, System Administration, or Cyber Security.
- Understanding of Malware Analysis, including isolated VM configuration and file format identification.
- Experience with Windows OS and/or Mac OS as an attack surface.
- Familiarity with basic Threat Actor tools and techniques like the MITRE ATT&CK Framework.
- Experience with Windows Administration and Enterprise Domain Administration.
- Network Administration Skills including understanding of protocols and network technologies.
- Basic knowledge of web technologies.
- Triage, investigate, and respond to alerts from the Huntress platform.
- Perform tactical forensic timelining and analysis to determine the root cause of attacks and suggest remediations.
- Conduct senior-level malware analysis during system investigations.
- Investigate suspicious Microsoft M365 activities and provide necessary remediations.
- Assist in escalations from the product support team regarding threat-related questions.
- Limited engagement with customers through video/phone to explain SOC activity.
- Help create or request new detections and tune existing detections.
- Contribute to a collaboratively mentored team and external Huntress content.
LeadershipCybersecurityMac OS XMicrosoft Active DirectoryCommunication SkillsAnalytical SkillsCollaborationProblem SolvingMentoringLinuxAttention to detailOrganizational skillsPresentation skillsTime ManagementWritten communicationDocumentationCoaching
Posted 2024-11-21
Apply