https://bayt.page.link/soHCNioYGVYnZS2Q6
Create a job alert for similar positions

Job Description

Help AG is looking for a talented and experience Digital Forensic and Incident Response Delivery Lead who will be responsible for the workflow, optimization, and delivery of Digital Forensic and Incident Response Services and related activities. This includes supporting the transition (onboarding and offboarding) of services to MSS-DFIR, as well as documentation and knowledge transfer. This role is the primary escalation point for one or more Managed Security Services, facing into one or more specific clients. The scope of delivery includes, but is not limited to: Alert Handling, Cyber Attack Detection and Response, Break-Fix and Incident Management, Use-Case and Playbook Optimization, Vulnerability Management, and Indicator-oriented Threat Hunting.The Digital Forensic and Incident Response Delivery Lead will also be responsible for leading the DFIR team and performing off-site and on-site Incident Response activities and customer engagements, leveraging multiple security technologies, guiding, and leading customers in the handling of Security Incidents and examining IT and security systems using best-practice digital forensic methods to detect, validate and mitigate IT security related incidents.ResponsibilitiesLead and mentor the DFIR team and act on daily management tasks, such as handling roster, leave, shift and workflow management for MSS-DFIR customers in alignment with Help AG MSS portfolio, including the optimization of people, process, and systems.Support Pre-sales, Sales, and Business Development of new and existing services-accountability.Work with internal peers and external stakeholders to achieve effective and sustainable delivery of Managed Security Services and associated service elements.Support the Service Transition process; work with peers to effectively transition customers and infrastructure into operations.Work proactively and collaboratively with peers (e.g. Managed Security Controls).Handle the creation, optimization and documentation of processes, procedures, and workflow, tracking and reporting of SLAs, KPIs and OLAs.Initiate, support, and manage incidents, problems, issues, risks, and compliance activities; 24x7 on-call for critical or urgent activities as required.Lead and coordinate incident response activities in unknown environments, including triage, containment, eradication, and remediation.Conduct in-depth forensic investigations to determine the root cause of security incidents and breaches.Develop and maintain standard incident response plans, best practices, policies, and procedures.Develop custom incident response plans tied to specific environments and customer situations.Collaborate with cross-functional teams, including IT, legal, and management, to ensure a coordinated response to security incidents.Examinate and analyses logs/data from a broad variety of security technologies, such as but not limited to Antiviruses, IDS/IPS, Firewalls, Switches, VPNs and other security data and log sources.Perform forensic analysis of different artifacts including RAM, packet captures, logs, and disk images.Reverse engineer malicious software and develop signatures and indicators of compromise.Actively develop incident response tools, scripts, and various detection content.Research Red Team techniques, develop custom detection queries, rules, watchlists and other content, and conduct threat hunts.Articulate and execute common Incident Response methods (e.g. SANS).Respond to inbound requests via phone and other electronic means for technical assistance with managed services.Work on-site as required with clients during Live Security Incidents (could be out of country).Maintain a high degree of awareness of the current threat landscape.Champion excellence and support others in delivering it through active knowledge sharing with team members, writing technical articles for internal knowledge bases, blog posts and reports as required or requested.Create and present customer reports to ensure quality, accuracy, and value to the client.Provide technical expertise and guidance to junior incident response and forensic investigation team members.Stay current with industry trends, emerging threats, and best practices in incident response and digital forensics.Perform other essential duties as assigned.Qualifications & Skills:A Degree in Computer Science, Information Systems, Electrical Engineering, or a closely related degree10+ years of experience in information security, in areas such as security operations, intrusion detection, incident analysis, incident handling, log analysis, malware analysis, reverse engineering or threat detectionA sound knowledge of IT security best practices, common attack types and detection/prevention methodsAt least 2-3 years of experience as a Senior or Lead Analyst, or equivalent experience guiding, mentoring, and teaching other Analysts/Security Professionals how to handle Security IncidentsCISSP, GCIA, GCIH, GCFA, GCFE, GREM, OSCP certification would be preferable.Strong background or equivalent experience in four of the following: Security Threat and Event Analysis, Network Security Operations or Engineering, Reverse Engineering, Malware Analysis, Windows/Linux/OSX Forensics, Penetration Testing, Active Directory and Azure AdministrationDemonstrable experience in accountability for and applying the methods of Incident Response, including adherence to process and direct engagement with stakeholders.Demonstrable experience in analyzing and interpreting system, security, and application logsBroad knowledge of the type of events that Firewalls, IDS/IPS and other security related devices produce.Demonstrable experience in the use of Digital Forensics tools, techniques and concepts including creating and using custom tools and scripts.Static reverse engineering and analysis of malware written in different languages (X86/X64/C/C#, Go, etc.), signatures and Yara/Snort/Sigma rules development.Strong knowledge of Red Team tactics and ability to find adversary traces on Enterprise scale.Rapid development in scripting languages: Python/PowerShell /Bash.Deep TCP/IP knowledge, networking, and security product experience.Knowledge of attack activities, such as scans, man in the middle, sniffing, DoS, DDoS, etc. and possible abnormal activities, such as worms, Trojans, viruses, etc.Demonstrate experience in handling Incident Response engagements (APTs and Ransomware) using the SANS Incident Response method (or similar).Outstanding organizational skills.Strong analytical and problem-solving skills.A motivated, self-managed, individual who can demonstrate above average analytical skills and work professionally with peers and customers even under pressure.Very good communication skills.Strong written and verbal skills.Benefits:Health insurance with one of the leading global providers for medical insurance.Career progression and growth through challenging projects and work.Employee engagement and wellness campaigns activities throughout the year.Excellent learning and development opportunities.Annual flights tickets to home country.Inclusive and diverse working environment.Flexible/Hybrid working environment.Open door policy.About Us:Help AG is the cybersecurity arm of e& enterprise (formerly Etisalat Digital) and provides leading enterprise businesses and governments across the Middle East with strategic consultancy combined with tailored information security services and solutions that address their diverse requirements, enabling them to evolve securely with a competitive edge.Present in the Middle East since 2004, Help AG was strategically acquired by e& (formerly Etisalat Group) in Feb 2020, hence creating a cybersecurity and digital transformation powerhouse in the region.Help AG has firmly established itself as the region's trusted IT security advisor by remaining vendor-agnostic, trustworthy, independent, and cybersecurity focused. With best-of-breed technologies from industry-leading vendor partners, expertly qualified service delivery teams and a state-of-the-art consulting practice, Help AG delivers unmatched value to its customers by strengthening their cyber defenses and safeguarding their business.
You have reached your limit of 15 Job Alerts. To create a new Job Alert, delete one of your existing Job Alerts first.
Similar jobs alert created successfully. You can manage alerts in settings.
Similar jobs alert disabled successfully. You can manage alerts in settings.