Qureos

FIND_THE_RIGHTJOB.

JOB_REQUIREMENTS

Hires in

Not specified

Employment Type

Not specified

Company Location

Not specified

Salary

Not specified

Key Responsibilities:


  • Collect and verify raw intelligence from multiple strategic and tactical data sources and correlate collected intelligence to build upon a larger knowledge.
  • Research threats, vulnerabilities, and intelligence on various attackers and attack infrastructure using internal and external resources.
  • Automate tracking and discovery of threats leveraging internal and external data sources.
  • Contribute to the production of reports detailing threat groups including TTPs.
  • Analyze logs and perform log correlations to identify anomalous/malicious behavior utilizing.
  • Responding to prioritized requests for information (RFI) and provide key findings to enable the production of finished intelligence.
  • Develop Attack detection response playbooks, counter-measure definition, and strategies to mitigate emerging threats.
  • Develop use cases mapped to common frameworks (e.g., MITRE ATT&CK) for detecting new/evolving threats, including supporting content for security tools (e.g., SIEM rules, NIDS signatures, EDR content, etc.).
  • Plan and execute regular simulation attack exercises (red-team/blue-team / purple-team) to validate detection, response, and remediation capabilities and improve MSOC readiness.


Qualifications:

  • Bachelor of Computer Science or equivalent

Professional Certifications:

  • Professional certification in pen testing from internationally recognized institution or relevant are preferred.

Years of Experience:

  • 6+ years of prior experience

Nature of Experience:

  • 2 years in security operation and threat hunting and 2 years in threat intelligence

Job Specific Skills:

  • Practical experience in Identifying and investigating information security incidents and developing recommendations to prevent similar incidents in the future.
  • Understanding of the methods, tools, and processes to respond to information security incidents.

© 2025 Qureos. All rights reserved.