テクノロジー

公開日:   2021/05/20

雇用形態

正社員

業種

IT

職種

Security

給与

15,000,000 円 ~ 9,000,000 円

勤務地

Tokyo

求人情報

As the IR Manager, you manage the delivery and development of our advanced suite of high-end response tools and services. Focusing as much on building innovative and industry-leading capabilities as on the investigative engagement of threat actors.  This is a role for those who are passionate about pushing the industry forward and raising the bar for Incident Response.

What you will do

  • Lead engagements with particular focus on log analysis, host forensics, network forensics, and malware triage in support of ongoing Incident Response investigations using ’s advanced response tooling
  • Manage and mentor the technical delivery cohort and region-local IR consulting team members.
  • Use and build upon s proprietary IR technology to conduct large-scale investigations across both the EDR and Digital Forensic evidence landscape
  • Assist with every stage of Incident Response lifecycle, including: scoping, analysis, remediation, reporting, and tactical communications
  • Review technical content such as playbooks, scripts, and automation tooling to enhance IR processes, investigation workflows, and IR infrastructure
  • Lead research into forensic artifacts, behavioral analysis and threat hunting techniques and implement them in the  IR investigations platform
  • Develop detailed, accurate, and professional engagement deliverable for technical and executive teams
    Support business development and global/regional practice operations.

 

応募資格

What we are looking for

    • Bachelor's degree in a technical field, or equivalent practical experience
      Minimum 5-7 years of Incident Response or comparable industry experience (threat hunting, threat detection and response, malware analysis, etc)
      Minimum 2 years of management experience
      Technical subject matter expertise in the following areas:
      Incident Response investigations of at least two major OS families (Windows, Mac OS, *nix)
      Digital forensics (disk and memory collection & analysis)
      Network Security Monitoring (NSM), network traffic analysis, and log analysis
      Static and dynamic malware analysis
      Behavioural Threat Hunting
      Threat Intelligence and adversary tracking
      Ability to develop tools, scripts and data-driven solutions is essential for this role. Examples of prior valuable experience include:
      Scripting languages such as Python, Javascript, Perl, etc
      Data science analysis with Jupyter, Pandas, SciPy, etc
      SQL/NoSQL databases and big data platforms
      DevOps and Infrastructure-as-Code (IaC)

次のキャリアアップのご相談はこちら

〒101- 0052 東京都千代田区
神田小川町 3-7-16 報道ビル8F
Copyright © 2020 The MLC Group G.K. All rights reserved. Designed by Tamago-DB . 無断複製禁止。