Development Engineer 4

India – Virtual – Maharashtra DTA

Comcast

Comcast NBCUniversal creates incredible technology and entertainment that connects millions of people to the moments and experiences that matter most.

View all jobs at Comcast

Apply now Apply later

Comcast brings together the best in media and technology. We drive innovation to create the world's best entertainment and online experiences. As a Fortune 50 leader, we set the pace in a variety of innovative and fascinating businesses and create career opportunities across a wide range of locations and disciplines. We are at the forefront of change and move at an amazing pace, thanks to our remarkable people, who bring cutting-edge products and services to life for millions of customers every day. If you share in our passion for teamwork, our vision to revolutionize industries and our goal to lead the future in media and technology, we want you to fast-forward your career at Comcast.

Job Summary

Responsible for planning and designing new software and web applications. Analyzes, tests and assists with the integration of new applications. Oversees the documentation of all development activity. Trains non-technical personnel. Assists with tracking performance metrics. Integrates knowledge of business and functional priorities. Acts as a key contributor in a complex and crucial environment. May lead teams or projects and shares expertise.

Job Description

Core Responsibilities

Responsible for regularly scheduled and repeatable Purple Teams to ensure detections are working.

Develop intelligence-driven hypotheses for hunts to target specific potential threat actors and vectors

Proactively "hunt" for potential malicious activity and incidents across multiple customers using advanced network- and host-based tools

Perform in-depth investigation & data analytics of events identified during threat hunt activities or security alerts received from various security technologies

Exploration and integration of new cybersecurity tools, processes, and capabilities

Contribute to the tuning and development of security information and event monitoring systems (SIEM) use cases and other security control configurations to enhance threat detection capabilities

Provide support in the detection, response, mitigation, and reporting of cyber threats affecting client networks with the ability to evaluate IT environments and identify security goals, objectives and requirements

Employees at all levels are expected to:


Must have hands-on experience in at least some of the following areas: forensic science, data analysis, intelligence analysis, malware reversing, network and endpoint security, adversary tracking, and other security-related tasks.

8+ years of professional experience, with 5+ years of experience in information security and/or IT risk management

3+ years of experience architecting solutions with a concentrated focus on security, performance, scalability, and reliability.

Must understand the current Cyber Security Landscape, such as, a deep knowledge of current and past malware methods, attack methodologies, and TTPs (Tactics, Techniques, Procedures)

Knowledge of Operating Systems and Network Protocols - An extensive knowledge of the inner workings of operating systems (Windows and Linux/Unix) is also indispensable. Moreover, cyber threat hunters also need to have a strong understanding of how different network protocols, such as the TCP/IP stack, work.

Technical Writing and Reporting Skills - Preparing security reports and different technical documents is an essential part of cyber threat hunting, so hunters also need to have excellent technical writing and reporting skills.

Experience in working and presenting to Executives in both IT and Business.

Highly advanced written and communication skills.

Knowledge of current hacking techniques, vulnerability disclosures, data breach incidents, and security analysis techniques

Familiarity with data analytics platforms (e.g. Various flavors of SQL, Splunk, Tableau) & analytic methodologies

Knowledge of threats and various attacker methods including tools/techniques/practices

Familiarity with existing TTP frameworks (MITRE ATT&CK, Cyber Kill Chain)

Demonstrated technical experience with Networking (e.g. data flows, architecture, protocols, traffic analysis, wireless, etc)

Demonstrated technical experience with detailed host-level logging (e.g. Windows Security logs, auditd, process logging)

Coding Skills - Hunters need to be fluent in at least one scripting language (Python preferred.). However, it can also be useful to know one or more compiled languages (C, C++, etc.) as well.
They also need to know how to parse logs, automate tasks, and perform complex data analysis.

Familiarity with scripting languages & concepts (e.g. Python, Powershell, bash, regular expressions)

Familiarity with performing Ethical Hacking of both web applications and their associated platforms (e.g. J2EE, .Net, Apache, IIS, Websphere) and infrastructure elements (e.g. Windows/Linux operating systems, Oracle/SQL servers, firewalls, routers, switches)

Familiar with common commercial and/or open source vulnerability assessment tools and techniques used for evaluating operating systems, networking devices, databases and web servers

Experience working with security monitoring, security intelligence, data analytics, security incident response, penetration testing, SIEM, and analytics tools.

Soft Skills - Threat hunters need to possess a handful of soft skills such as strong stress management, analytical, research, and problem-solving skills. They need to be self-starters who are able to work with minimal management, however also need to have strong collaboration and
interpersonal skills as they usually work together with several other professionals from other
information security fields.

Disclaimer:

  • This information has been designed to indicate the general nature and level of work performed by employees in this role. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities and qualifications.

Skills

We believe that benefits should connect you to the support you need when it matters most, and should help you care for those who matter most. That's why we provide an array of options, expert guidance and always-on tools that are personalized to meet the needs of your reality—to help support you physically, financially and emotionally through the big milestones and in your everyday life.


Please visit the benefits summary on our careers site for more details.

Education

Bachelor's Degree

While possessing the stated degree is preferred, Comcast also may consider applicants who hold some combination of coursework and experience, or who have extensive related professional experience.

Certifications (if applicable)

Relative Work Experience

7-10 Years

Comcast is proud to be an equal opportunity workplace. We will consider all qualified applicants for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, disability, veteran status, genetic information, or any other basis protected by applicable law.
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Analytics Bash C Cyber Kill Chain Data Analytics Endpoint security Ethical hacking Firewalls Incident response Linux Malware MITRE ATT&CK Monitoring Open Source Oracle Pentesting PowerShell Python Risk management Scripting Security analysis SIEM Splunk SQL TCP/IP Threat detection TTPs UNIX Windows

Perks/benefits: Career development Equity / stock options

Region: Remote/Anywhere

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.