Detection Engineer - CTU Detection Research

Remote - United Kingdom (London-Thames Valley)

Applications have closed

Dell Technologies

Dell bietet Technologielösungen, Services und Support. Notebooks, Touchscreen-PCs, Desktop-PCs, Server, Speicher, Monitore, Gaming und Zubehör kaufen

View all jobs at Dell Technologies

Secureworks (NASDAQ: SCWX) is a global cybersecurity leader that secures human progress with Secureworks® Taegis™, a SaaS-based, open XDR platform built on 20+ years of real-world threat intelligence and research, improving customers’ ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions.

We enjoy competitive compensation and benefits packages, and reward and recognize our employees for exceptional results. A constant focus on continued learning and growth keeps our team members engaged and excited about “what’s next.” We offer flexible work options when available, and emphasize the importance of work-life balance. We know that when our people are rewarded, recognized, and rejuvenated, we win as a team.

Role Overview

The CTU Detection Engineer will be responsible for performing detail-oriented work that involves security threat analysis of various malware and web attacks across the entire Secureworks’ landscape and introducing those learnings into the Taegis platform. You will display advanced knowledge of the Taegis Platform, backend and workflow processes. Your focus is to ensure an optimal and constantly improving signal:noise alert ratio is being presented to our analysts and clients.

The successful candidate must be a strong practitioner in the security field with proven technical skills and experience researching, hunting for, and responding to advanced threat actors. This candidate will possess skills to create and maintain high fidelity detections. As a member of a highly trained security research team – The Counter Threat Unit (CTU™) - the candidate will contribute technical leadership for client-focused projects, generate high-confidence threat detection, and contribute to the development of advanced technologies and processes to detect threat actors, enhancing protections for our Taegis customers.

Role Responsibilities

Development of countermeasures to detect or block threats:

  • Transform new and emerging threat research into actionable detection measures, leveraging creative countermeasure development techniques and detection tooling.

  • Discover how a threat manifests on the endpoint and research how to detect that threat in network, endpoint and application telemetry.

  • Contribute to the development and delivery of competitive services, methodologies, and deliverables in the security marketplace.

  • Contribute to the development and delivery of internal tooling, technologies and processes.

  • Serve as a subject matter expert in key elements of the practice to other departments, including marketing, product management, and the broader Counter Threat Unit research team.

Requirements

  • Static and dynamic malicious code analysis
    • Reverse engineering IA32/64 architecture binaries designed for popular operating systems (Windows, OSX, Linux).
    • Reverse engineering mobile ARM architecture binaries.
  • Data Analysis and Programming
    • Scripting PowerShell, Bash, Python and foundational programming skills.
    • Hands on Experience with popular Python data science packages such as Numpy, Pandas, and Matplotlib.
    • Familiarity with CI/CD pipelines, testing and automation.
  • Forensic analysis of collected evidence artifacts
    • Analysis of memory images from common OS types.
    • Analysis of disk images that may involve various file systems (NTFS, FAT, EXT, HFS+...) and operating systems.
  • Network traffic analysis
    • Identifying detectable traits of threat network traffic.
    • Broad analysis of traffic patterns to identify anomalies.
    • Event log analysis.
  • Inspection of log data from common operating systems and security infrastructure to identify threat activity and piece together an incident.

Education, Experience & Credentials

  • Typically requires 8+ years of related experience in a professional role with a Bachelor’s degree; or 6+ years with a Master’s degree; or 3+ years with a PhD; or equivalent experience
  • GSEC, GCIA, GPEN, GWAPT, GCIH, GSEC, OSCP, OSCE, or equivalent certifications

Secureworks is committed to the principle of equal employment opportunity for all employees and to providing employees with a work environment free of discrimination and harassment. All employment decisions at Secureworks are based on business needs, job requirements and individual qualifications, without regard to race, color, religion or belief, national, social or ethnic origin, sex (including pregnancy), age, physical, mental or sensory disability, HIV status, sexual orientation, gender identity and/or expression, marital, civil union or domestic partnership status, past or present military service, family medical history or genetic information, family or parental status, or any other status protected by the laws or regulations in the locations where we operate. Secureworks will not tolerate discrimination or harassment based on any of these characteristics.

#Radancy

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  8  1  0

Tags: Automation Bash CI/CD Code analysis GCIA GCIH GPEN GSEC GWAPT Linux Log analysis Malware OSCE OSCP PhD PowerShell Python Reverse engineering SaaS Scripting Threat detection Threat intelligence Threat Research Windows XDR

Perks/benefits: Career development Competitive pay

Regions: Remote/Anywhere Europe
Country: United Kingdom

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.