Endpoint Security & Threat Hunting Specialist
The team for Cybersecurity and Data Privacy operates under the supervision of the Chief Information Security Officer, Jason Lau, a distinguished professional in the cybersecurity field. The team encompasses various functions, including Blockchain Security, Operational Security, and Security Governance and Compliance. Our ethos emphasizes fostering a growth mindset and extending support to aid in achievement of individual potential. We uphold a primary directive of Security and Data Privacy Compliance. Notably, our security endeavors led our company to become the foremost Crypto organization globally to attain ISO27001, ISO27701, ISO22301, and PCI:DSS 3.2.1 (Level 1) certifications. Our thorough verification by SGS, an international audit firm, culminated in receiving the highest level of "Adaptive (Tier 4)" accolade according to the US National Institute of Standards and Technology (NIST) Cybersecurity Framework, NIST Privacy Framework, and maintain other regional certifications including SOC2 and the Data Protection Trust Mark.
We are seeking an intermediate level security specialist to join our Global Cyber Fusion Center. In this role, your responsibilities will encompass supporting continuous threat monitoring, hunting, response capabilities, as well as making valuable contributions to key endpoint security projects and initiatives.
Responsibilities
- Conduct in-depth investigations into Tier 1 and Tier 2 security operations escalations, perform incident triage, and root cause analysis.
- Proficiency in utilizing open source and proprietary tools for investigations such as EPP/EDR/XDR software, digital forensics tools/software, SIEM platforms, etc.
- Skillful in Threat Hunting methodologies, with the ability to strategize and execute Threat Hunts using available data sources and security tools.
- Proficient in managing end-to-end Incident Response, providing leadership during investigations and incidents to guide activities like containment, mitigation, and other security measures.
- Lead various security projects involving Endpoint Security enhancements, Threat Hunting, Compromise Assessments, Network/Endpoint security reviews, etc.
- Show adeptness in overseeing deployment, configuration, and maintenance of Endpoint Security Software/Tools - encompassing EPP/EDR/XDR software, digital forensics tools/software, SIEM/log collection agents, etc.
- Possess comfort with cross-functional leadership and stakeholder management, and readiness to lead and support a team of junior security specialists.
Requirements
- 5-7 years of experience in Information Security with hands-on expertise in Security Operations, Digital Forensics, Incident Response, Endpoint Security, or Cloud Security.
- Hands-on experience with SIEM, EPP/EDR/XDR, SOAR, Cloud Security, Digital Forensics software & tools.
- Proficiency in Cloud environments like AWS and Azure.
- Experience in scripting languages for task automation and data manipulation, or programming experience is advantageous.
- Management experience is a plus.
- Self-motivated, detail-oriented, and outcome-driven.
- Proficient in verbal and written English.
- On-call availability is essential.
Benefits
- Competitive salary
- Medical insurance coverage for self and dependents
- Generous annual leave entitlement, including birthday and work anniversary benefits
- Work flexibility options, including flexi-work hours and hybrid or remote work setup
- Career development opportunities through internal mobility programs
- Work perks, including a Crypto.com Visa card upon joining
About Crypto.com:
Established in 2016, Crypto.com serves a vast customer base and is among the industry's fastest-growing global cryptocurrency platforms. With a commitment towards security, privacy, compliance, and innovation, Crypto.com aims to promote cryptocurrency adoption and empower future innovators towards a more equitable digital ecosystem.
Experience more at https://crypto.com. «Optional: Check the company's website for more information».
Crypto.com is dedicated to equal opportunities. Our hiring process aims to ensure fairness and transparency, embracing diversity and inclusion to strengthen our team. Personal data shared by applicants is used solely for recruitment purposes.
Kindly note that only shortlisted candidates will be contacted for further steps.