Proficio is an award-winning managed detection and response (MDR) services provider. We provide 24/7 security monitoring, investigation, alerting and response services to organizations in healthcare, financial services, manufacturing, retail and other industries. Proficio has been highlighted in Gartner’s Market Guide for Managed Detection and Response Services for the last three consecutive years. We have a track record of innovation. Proficio invented the concept of SOC-as-a-Service. We were the first MSSP to provide automated response services and the first in our space to provide a risk scoring dashboard.
Our typical client is a medium to large-sized organization that lacks the in-house resources to address the challenges of a rapidly changing threat landscape. The difficulty of hiring and retaining cybersecurity professionals are widely understood but our prospective clients also struggle to effectively harness technology and build hardened processes.
While Proficio has developed a unified service delivery platform designed to meet the needs of the most demanding clients, what sets us apart is the quality and passion of our people. We believe the SOC of the Future will meld the creativity of human intelligence with the power of advanced technologies like AI.
Summary:
The Managed infrastructure Services team is seeking an experienced MEDR threat engineer who is technical, collaborative, and excited about working on endpoint products. In this role, you will bring your in-depth knowledge of the endpoint and detection response tasks to help guide the evolution of Proficio's Managed EDR visibility, detection, and prevention technologies. You will work closely with engineering, project managers, Hosted & Managed SIEM team, sales, and other departments. You will bring existing knowledge about product EDR best practices and apply them in delivering significant new features and enhancements. The successful candidate will have the ability to interface and influence cross-functional teams throughout the company.
Responsibilities:
- Maintain, administer, and provide end point security management tools (anti-virus, data loss prevention, web/spam filtering, etc.)
- Assist / advise customers with viruses and system vulnerabilities/threats
- Proactively hunt for threats and undetected abuse by leveraging internal data, open-source intelligence, and third -party private intelligence
- Investigate complex account security abuses to understand in granular detail how abuse is occurring
- Identify and implement appropriate detection or prevention strategies to mitigate harm both in the current case and from similar forward-looking abuse
- Understand the application of tactics, techniques, and procedures, as well as tooling, that actors use across various attack surfaces
- Lead technical investigations from start-to-finish, to include effectively communicating actionable results, analytic judgments, and mitigations to different audience types across cross-functional settings
- Identify trends in adversary behavior, and proactively surface risks that may represent previously unidentified or novel vectors for harm
- Deeply understand how abuse manifests and clearly explain emerging threats and trends, with an emphasis on security understanding
- Analyze and interpret complex, high volume, and high dimensionality data from varying sources to advance investigations, quantify trends, or support findings
- Implement efficiencies and create strategies to better detect/respond to cyber incidents
Requirements
- 3.5+ years work experience in a cyber security, security investigations, or cyber threat intelligence investigation’s role
- REQUIRED: Experience with deployment, configuration, and maintenance to support the Enterprise EDR Solutions CrowdStrike Falcon and Microsoft Defender APT
- Experience investigating and acting on high-impact threats such as account compromise, account creation abuse, business compromise, or malware analysis
- Experience thinking critically and qualifying assessments with solid communications skills in a cross-functional setting to influence decision makers
- 2+ years of experience with performing systems administration, including basic troubleshooting and installation, monitoring system performance or availability, and performing security upgrades
- Knowledge of network security architecture concepts including topology, protocols, components, and principles
- Knowledge of various Enterprise Operating System (OS) configurations and management tools for use during deployment, configuration, and management of EDR solutions
Additional Qualifications:
- Good to have experience working in a Security Operations Center (SOC) environment including Incident Response, Vulnerability Scanning, Threat Hunting, Network Monitoring/Log Management, or Compliance Management
- Good to have experience with complimentary Enterprise Security Tools including Security Information & Event Management (SIEM), Threat Intelligence Platforms (TIPs), or Network Monitoring Tools
- Experience with triaging security events in a security operations center (SOC) environment, leveraging data collected from enterprise security solutions
- Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions
- Ability to integrate Cybersecurity data using enterprise or custom tools data aggregation and analysis tools, including Splunk and Elastic
Benefits
- Opportunity to work in a progressive organization with structured training and roadmap for success
- Health benefits, lunches, gym reimbursement, and internet funding for our India staff!
- Experience in one of the hottest IT industries today
Proficio is an EOE employer.
Proficio collects certain personal information upon your submission of an application for an open position. More information is available about your consumer rights and our privacy policy at www.proficio.com/privacypolicy
Tags
security
AI/ML
healthcare
retail
cybersecurity
Apply to job