About the Position

Designing methodologies for continuous data collection of machine-generated data and the integrating of threat intelligence feeds; Developing and employing various methods and tools for data pre-processing, analysis, and visualization; Implementing and evaluating feature engineering techniques, statistical models, and algorithms for Cyber analytics and incident detection; Recognizing new use cases and opportunities to address specific business problems and challenges

Requirements

  • B.Sc. in a related field
  • At least 3 years of relevant experience in network security monitoring / intrusion detection analysis / incident response
  • In-depth knowledge of network protocols (TCP/IP)
  • Experience in programmatically analyzing and manipulating high-volume, multi-dimensional diverse data; in Python – an advantage
  • Experience coding in Python
  • Demonstrated success at thriving in an environment which offers ambiguously defined problems, big challenges, and quick changes
  • Excellent communication skills and able to work in a team
    Fluent English
  • Experience working with security monitoring tools like ELK stack /Snort / Bro / Wireshark – an advantage
  • Experience designing and customizing policies for SIEM, AV and IPS/IDS – an advantage
  • Experience implementing methods for feature engineering, statistical modeling, and machine learning – an advantage
  • Knowledge of ICS network architecture and protocols – an advantage
  • Familiar with data visualization tools and frameworks – an advantage
Job Type: Full Time
Job Location: EMEA

Apply for this position

Allowed Type(s): .pdf, .doc, .docx