Are you passionate about cybersecurity and have at least 1 year of experience in threat hunting?
we are looking for a junior professional with strong analytical skills and the ability to identify, investigate, and respond to advanced threats, joining a 100% remote project.
we offer a stable schedule from
3:00 pm to 11:00 pm
, ideal for those who prefer working afternoon shifts and enjoying all the benefits of remote work.
the selected candidate should have some experience in incident management and knowledge in the following areas:
key requirements:
threat actors and campaigns:
knowledge of tactics, techniques, and procedures (ttps).
necessary tools
(at least one per category):
edr:
cortex xdr, mde, falcon, orion, s1, or others.
siem:
qradar, splunk, or others.
nice to have:
experience with forensic analysis tools such as volatility or regripper.
knowledge of static and dynamic malware analysis.
custom development or scripting in bash/python.
experience in adversary emulation and offensive techniques.
use and/or development of scraping tools and open-source intelligence searches.
digital surveillance.
tasks:
1. Threat monitoring and analysis:
conduct proactive threat hunting in corporate environments using tools such as edr and siem.
identify suspicious patterns and correlate them with known threat actors, campaigns, or ttps.
2. Incident support:
participate in the detection, analysis, and response to security incidents.
collaborate with internal teams to contain and remediate incidents, documenting lessons learned.
3. Research and technical analysis:
analyze and pivot indicators of compromise (iocs) and security events to assess the impact and scope of threats.
4. Documentation and reporting:
produce technical and executive reports on investigations and findings.
provide recommendations to mitigate threats and improve the security posture.