CARS Threat Hunter/Modeler (Budapest)

CARS Threat Hunter/Modeler (Budapest)
A hirdetés már lejárt!

CARS Threat Hunter/Modeler


To prevent. To outthink threats. Not just to do something better, but to attempt what some would consider impossible. To lead in this new landscape of security technology and solve some of the world’s most challenging security problems.

Threat Hunting using various toolsets, based on intelligence gathered

Ability to recognize and research attacks and attack patterns

Knowledge and experience in analysis of various threat actor groups, attack patterns and tactics, techniques, and procedures (TTPs), deep analysis of threats across the enterprise by combining security rules, content, policy and relevant datasets

Develop attack detection & response playbooks, counter-measure definition and strategies to mitigate emerging threats

Conduct cyber threat modelling to improve threat detection & mitigation

Demonstrable systems thinking and ability to clearly synthesize and communicate complex topics

Ability to collaborate in a virtual team and interface with multitude of stakeholders within or outside the SOC.


Experience with security devices such as SIEM, IDS/IPS, HIDS/HIPS, anomaly detection, Firewall, Antivirus systems, Endpoint Detection & Response tools and their log output

Experience in analyzing large data sets

Experience in using data mining, analytic and visualization tools, such as data lakes (Elastic, HDFS), Linux tools (ex. Grep, cut, sort) and regex

Experience with industrial taxonomies like Cyber Kill Chain, MiTRE’s ATT&CK, MiTRE’s CAPEC, MiTRE’s CAR, NIST, CIF, SANS and STIX 2.0

Strong communication skills both written and verbally

Ability to translate security impacts to the wider business

Ability to understand end-to-end threat landscape of all sectors

Skills to analyze attack vectors against a particular system to determine attack surface

Ability to produce contextual attack models applied to a scenario

Ability to demonstrate intrusion sets using cyber kill-chain and Tactics, Techniques and Procedures

Ability to co-ordinate with other security focal point during an active incident

Knowledge of security controls, how they can be monitored, and thwarted

Knowledge on vulnerability detection and response from Threat Hunting point of view

Network forensics: network traffic protocols, traffic analysis (i.e. Network flows and PCAP), intrusion detection

Analytical, logical and Problem-Solving Skills

Knowledge of cyber security threats, threat actors and their associated TTPs

Knowledge on OSI layers

Knowledge on Security Tools in Application, Data, Networks and Endpoint layers

Knowledge on malware-analysis and malware functionalities

Knowledge on native system and network policies

Knowledge on Query structures like Regular Expression, YARA and Snort rule, AQL and KQL types

Basic knowledge on scripting languages like Bash, Python and PowerShell, etc

Knowledge of log formats for syslog, http logs, DB logs and how to gather forensics for traceability back to a security event

Takes an active part in the gathering, analysis, and communication of threat intelligence through the intelligence process

Provide intelligence briefings to other areas of the business on threats or threat actors and the risk they bring to the environment

Coordinates the planning, development and production of communication materials using various communication vehicles

Interface with Security Operational Center (SOC) management and related internal groups for review, production, and dissemination of content

What we offer:

Full remote work

International company and team


Equipment is guaranteed by Client

Competitive and performance-based remuneration

Munkavégzés helye



Állásajánlatok - legnépszerűbb városok