Hays IT Contracting is a cooperation based on B2B rules. We connect IT specialists with the most interesting, technological projects on the market. Join the group of 500 satisfied Contractors working for Hays’ clients!
For our Client we are currently looking for Candidates for the position of:
Principal Security Defense Engineer
Location: 100% remote
Job type: B2B (with Hays Poland)
Length: long-term cooperation
Rate: up to 250 net on B2B; up to 300 net on B2B - for candidates with the most comprehensive experience
Start date: ASAP
Working hours: flexible, between 7:00 and 20:00
Tech stack:
Python/Java/PowerShell (or other), IDA Pro, Snort, Suricata, TTPs
What will you do:
- Perform static and dynamic analysis of samples, and reverse engineering in support of SOC investigations and proactive threat detection and prevention
- Develop tools and methods for use in hunt and incident response activities
- Collaborate with the threat intelligence team to perform proactive research and analysis of the latest threat actor tactics, techniques, and procedures (TTPs) to inform threat detection efforts
- Research, build, and maintain detection capabilities for the latest threats across SIEM, log analytic, and security tool platforms
- Support projects to improve SOC effectiveness, advancing technical capabilities on pace with threats.
- Support and integrate with incident response, threat intelligence, and overall security strategy as needed
- Generate high quality documentation of research and analysis results, and relay processes and findings clearly and concisely to both technical and non-technical audiences
What will you get:
- Long-term cooperation
- Fast recruitment process - one meeting, decision even within 1 day
- Standard benefits - preferential rates for LuxMed and Multisport packages
- When you choose to work via Hays, you also get the opportunity to work for many of Hays' other leading clients in the future
What we expect from you:
- 4+ years of experience in Information Security
- Practical experience with malware analysis and reverse engineering experience
- Experience performing log analysis and host/network forensic analysis in support of incident response or forensics
- Min. 3 years of experience developing network signature (e.g. Snort, Suricata) and endpoint threat detections
- Expertise in one or more of programming/scripting language such as Python, Java, or PowerShell
- Working knowledge of Reverse Engineering skills: familiar with debuggers, disassemblers, network protocols, file formats, sandboxes, packed and obfuscated codes as well as Reverse Engineering tools such as IDA Pro
- Provide exemplary leadership in a challenging environment and influence the organization.
- Ability to manage multiple activities and events simultaneously, with a strong ability to prioritize multiple tasks and respond to high-priority events; organizing and scheduling work effectively.
- Ability to operate effectively as part of a geographically dispersed team and work with little to no supervision
What will the recruitment process look like:
- Your CV will be verified by Hays Recruiter
- Recruiter will contact you by phone - a 15-minute conversation about the project and your experience
- Technical conversation with the client - online meeting (1h)
- Offer
- Welcome to the project!
#1163351