We are seeking a driven problem solver to join our Unit 42 MDR team.
Our team is responsible for customers internal security monitoring, threat hunting and incident response. As a MDR Manager, we will rely on you to manage a team of experts who detect and respond to cyber incidents facing customers internal business.
As a team manager, you will join a team of managers who overlook the Unit 42 MDR team to ensure premium delivery to our customers and also have a critical role in how the team works, but also be able to create new processes, methodologies and capabilities that the team requires.
Your Impact:
Hire for and lead a team of MDR Analysts working globally, guide the team, create and improve processes, methodologies and capabilities that the team requires to work effectively
Lead a team that analyzes incidents from real customer environments to identify ongoing threats to customer environments
Provide critical feedback to the different product, research and engineering and threat hunting teams to help improve the products for the entire customer base
Work closely with Security Research, Threat Intelligence and Threat Hunting teams to remediate and detect new emerging threats.
Requirements: At least 3 years of team management experience, global management experience (world-wide team) is a plus
Great interpersonal skills and a proven experience collaborating with customers
Understanding of the threat landscape in terms of the tools, tactics, and techniques of attacks, as well as networking and security fundamentals
Basic hands-on coding skills (e.g. Python)
Excellent written and oral communication skills in English
Experience investigating targeted, sophisticated or hidden threats
Background in forensic analysis and incident and response tools to identify a threat and determine the extent and scope of a compromise
Experience with investigative technologies such as SIEM, packet capture analysis, host forensics, and Endpoint Detection and Response tools
Understanding of how APTs operate and the attack cycle different attack vectors, propagation and data exfiltration, lateral movement, persistence mechanism, etc.
Understanding of how organizations protect themselves from cyber-attacks, what tools are used and what remediation techniques are leveraged
Advantages:
Having worked in SOC analysis or an investigation environment
Having worked in Incident Response environment.
This position is open to all candidates.