Development Engineer 4
India – Virtual – Maharashtra DTA
Comcast
Comcast NBCUniversal creates incredible technology and entertainment that connects millions of people to the moments and experiences that matter most.Job Summary
Responsible for planning and designing new software and web applications. Analyzes, tests and assists with the integration of new applications. Oversees the documentation of all development activity. Trains non-technical personnel. Assists with tracking performance metrics. Integrates knowledge of business and functional priorities. Acts as a key contributor in a complex and crucial environment. May lead teams or projects and shares expertise.Job Description
Core Responsibilities
- Responsible for regularly scheduled and repeatable Purple Teams to ensure detections are working.
•
Develop intelligence-driven hypotheses for hunts to target specific potential threat actors and vectors
•
Proactively "hunt" for potential malicious activity and incidents across multiple customers using advanced network- and host-based tools
•
Perform in-depth investigation & data analytics of events identified during threat hunt activities or security alerts received from various security technologies
•
Exploration and integration of new cybersecurity tools, processes, and capabilities
•
Contribute to the tuning and development of security information and event monitoring systems (SIEM) use cases and other security control configurations to enhance threat detection capabilities
•
Provide support in the detection, response, mitigation, and reporting of cyber threats affecting client networks with the ability to evaluate IT environments and identify security goals, objectives and requirements
Analysis & Reporting
•
Creation of concise and professional materials to communicate goals, objectives and incident reporting.
•
Develop dashboards & reporting for continuous monitoring of targeted activity and for communication of quantifiable metrics to leadership
•
Continuously review and evaluate the state of Comcast Security environment and recommend technology and process improvements.
•
Serve as a technical leadership team and advisor to key stakeholders, establishing trust-based relationships through active engagement and collaboration.
Employees at all levels are expected to:
•
Must have hands-on experience in at least some of the following areas: forensic science, data analysis, intelligence analysis, malware reversing, network and endpoint security, adversary tracking, and other security-related tasks.
•
8+ years of professional experience, with 5+ years of experience in information security and/or IT risk management
•
3+ years of experience architecting solutions with a concentrated focus on security, performance, scalability, and reliability.
•
Must understand the current Cyber Security Landscape, such as, a deep knowledge of current and past malware methods, attack methodologies, and TTPs (Tactics, Techniques, Procedures)
•
Knowledge of Operating Systems and Network Protocols - An extensive knowledge of the inner workings of operating systems (Windows and Linux/Unix) is also indispensable. Moreover, cyber threat hunters also need to have a strong understanding of how different network protocols, such as the TCP/IP stack, work.
•
Technical Writing and Reporting Skills - Preparing security reports and different technical documents is an essential part of cyber threat hunting, so hunters also need to have excellent technical writing and reporting skills.
•
Experience in working and presenting to Executives in both IT and Business.
•
Highly advanced written and communication skills.
•
Knowledge of current hacking techniques, vulnerability disclosures, data breach incidents, and security analysis techniques
•
Familiarity with data analytics platforms (e.g. Various flavors of SQL, Splunk, Tableau) & analytic methodologies
•
Knowledge of threats and various attacker methods including tools/techniques/practices
•
Familiarity with existing TTP frameworks (MITRE ATT&CK, Cyber Kill Chain)
•
Demonstrated technical experience with Networking (e.g. data flows, architecture, protocols, traffic analysis, wireless, etc)
•
Demonstrated technical experience with detailed host-level logging (e.g. Windows Security logs, auditd, process logging)
•
Coding Skills - Hunters need to be fluent in at least one scripting language (Python preferred.). However, it can also be useful to know one or more compiled languages (C, C++, etc.) as well.
They also need to know how to parse logs, automate tasks, and perform complex data analysis.
•
Familiarity with scripting languages & concepts (e.g. Python, Powershell, bash, regular expressions)
•
Familiarity with performing Ethical Hacking of both web applications and their associated platforms (e.g. J2EE, .Net, Apache, IIS, Websphere) and infrastructure elements (e.g. Windows/Linux operating systems, Oracle/SQL servers, firewalls, routers, switches)
•
Familiar with common commercial and/or open source vulnerability assessment tools and techniques used for evaluating operating systems, networking devices, databases and web servers
•
Experience working with security monitoring, security intelligence, data analytics, security incident response, penetration testing, SIEM, and analytics tools.
•
Soft Skills - Threat hunters need to possess a handful of soft skills such as strong stress management, analytical, research, and problem-solving skills. They need to be self-starters who are able to work with minimal management, however also need to have strong collaboration and
interpersonal skills as they usually work together with several other professionals from other
information security fields.
Disclaimer:
- This information has been designed to indicate the general nature and level of work performed by employees in this role. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities and qualifications.
Skills
We believe that benefits should connect you to the support you need when it matters most, and should help you care for those who matter most. That's why we provide an array of options, expert guidance and always-on tools that are personalized to meet the needs of your reality—to help support you physically, financially and emotionally through the big milestones and in your everyday life.
Please visit the benefits summary on our careers site for more details.
Education
Bachelor's DegreeWhile possessing the stated degree is preferred, Comcast also may consider applicants who hold some combination of coursework and experience, or who have extensive related professional experience.Certifications (if applicable)
Relative Work Experience
7-10 YearsComcast is proud to be an equal opportunity workplace. We will consider all qualified applicants for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, disability, veteran status, genetic information, or any other basis protected by applicable law.* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics Bash C Cyber Kill Chain Data Analytics Endpoint security Ethical hacking Firewalls Incident response Linux Malware MITRE ATT&CK Monitoring Open Source Oracle Pentesting PowerShell Python Risk management Scripting Security analysis SIEM Splunk SQL TCP/IP Threat detection TTPs UNIX Windows
Perks/benefits: Career development Equity / stock options Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.