Cyber Threat Hunt Consultant (m/f/d)

DEU Böblingen (CSC Location)

DXC Technology

DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds.

View all jobs at DXC Technology

Apply now Apply later

Job Description:

DXC Technology is a Fortune 500 global IT services leader. Our more than 130,000 people in 70-plus countries are entrusted by our customers to deliver what matters most. We use the power of technology to deliver mission critical IT services that drive business impact. DXC is an employer of choice with strong values, and fosters a culture of inclusion, belonging and corporate citizenship.

What to expect?

The main goal of Cyber Threat Hunting is to proactively identify undetected cyber threats affecting DXC and its customers.

The Senior Cyber Threat Hunter will be responsible for providing technical support in the creation and delivery of technology solutions designed to meet both DFI’s and its customers’ business needs. Utilising a combination of both commercial platforms and Open-Source data, they will leverage intelligence to help formulate and deliver Threat Hunting and Incident Response services on behalf of DXC.

Location: Germany

Responsibilities:

  • Handle Threat Hunt service requests, queries and issues.

  • Manage workload distribution and organisation of all aspects of the delivery of the Threat Hunt service for the assigned client

  • Lead major Incident Investigations, tracking and coordinating the actions of team members

  • Report accordingly on the status of client Threat Hunts to operational management

  • Analyse and correlate results from various technology platforms. This entails investigating and assessing the impact of security events resulting from hits on indicators of compromise (IOCs), indicators of attack (IOA), or behavioural patterns (TTP’s - Tactics, Techniques, and Procedures) derived from bespoke queries within available technology platforms

  • Able to travel to client sites when needed

  • Participation in an on-call rota

What do we expect?

  • Event and Alert analysis from platforms such as a SIEM

  • Log analysis – particularly Windows Event Logs, Web logs, Linux logs

  • 2yr+ Endpoint Detection and Response (EDR) experience

  • 5yr+ industry experience

  • Deep understanding of Windows Operating Systems and Linux Operating Systems

  • Deep understanding of the principles of Threat Hunting and Incident Response

  • Understanding of 24x7 mission critical enterprise computing environments and the impact of service disruption on a company’s bottom line

  • Fluent in written and spoken German and English.

Nice to have

  • Any Threat Hunting / Forensic Analysis / Incident Response certifications

  • Other certifications (e.g. CHFI, CISSP, CEH, CompTIA Security +, GCIH, GREM, GCFA)

  • Computer Forensics / Cyber Security / Ethical Hacking experience

  • Malware Analysis, Reverse Engineering

  • Penetration Testing

DXC Technology stands for equal opportunities, namely we do not discriminate on the basis of race, religion, color, sex, age, disability or sexual orientation.  All recruitment decisions are based solely on qualifications, skills, knowledge and experience and relevant business requirements.

Thank you for taking time reviewing our job ad. If you believe this is the right match for you, please do not hesitate to apply. We are eager to learn more about you!

Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.

Apply now Apply later
  • Share this job via
  • 𝕏
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0

Tags: CEH CHFI CISSP CompTIA EDR Ethical hacking Forensics GCFA GCIH GREM Incident response Linux Log analysis Malware Pentesting Reverse engineering SIEM Windows

Perks/benefits: Team events

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.