Cyber Threat Intelligence (Blue Team DART)

Seoul, South Korea

Coupang

Join us to innovate. Rocket your career. Collaborate with teams across the globe. Find your role and learn more about our culture.

View all jobs at Coupang

ํŒ€ ์†Œ๊ฐœ

BlueTeam DART์—์„œ๋Š” ์ฟ ํŒก ๋ฐ ์ฟ ํŒก ์žํšŒ์‚ฌ๋กœ ๋ฐœ์ƒํ•˜๋Š” ๋ณด์•ˆ ์œ„ํ˜‘์„ ์กฐ๊ธฐ์— ํƒ์ง€ํ•˜๊ณ  ๋Œ€์‘ํ•˜์—ฌ ํ”ผํ•ด๋ฅผ ์ตœ์†Œํ™” ํ•˜๊ณ , ๋ณด์•ˆ ์‚ฌ๊ณ ์˜ ์›์ธ์„ ๋ฐํžˆ๊ณ  ์ œ๊ฑฐํ•˜์—ฌ ์žฌ๋ฐœ์„ ๋ฐฉ์ง€ํ•˜๋Š” ์—ญํ• ์„ ํ•ฉ๋‹ˆ๋‹ค. CTI(Cyber Threat Intelligence) ๋Š” ๋‹ค์–‘ํ•œ ์†Œ์Šค๋กœ๋ถ€ํ„ฐ ์ฟ ํŒก๊ณผ ๊ด€๋ จ๋œ ๊ตญ๋‚ด ๋ฐ ๊ธ€๋กœ๋ฒŒ ๋ณด์•ˆ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค๋ฅผ ์กฐ์‚ฌํ•˜๊ณ , ์ตœ๊ทผ์˜ ๋ณด์•ˆ์œ„ํ˜‘ ๋™ํ–ฅ์„ ์กฐ์‚ฌ ๋ฐ ๋ถ„์„ ํ›„ ์ฟ ํŒก์— ์œ„ํ˜‘์ด ๋˜๋Š” Cyber Threat์„ ์„ ๋ณ„ํ•˜๊ณ , ๋ธ”๋ฃจํŒ€์˜ ๋ชจ๋‹ˆํ„ฐ๋ง ํ™˜๊ฒฝ์— ์ ์šฉํ•˜์—ฌ ์ฟ ํŒก์˜ ๋ณด์•ˆ ํ™˜๊ฒฝ์„ ๊ฐ•ํ™”ํ•˜๋Š” ์—ญํ• ์„ ํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ๋”๋ถˆ์–ด Attack Surface Monitoring, ๋‹คํฌ์›น ํ™œ๋™ ๋ชจ๋‹ˆํ„ฐ๋ง ๋“ฑ์„ ํ†ตํ•ด ์ฟ ํŒก์˜ ์ž ์žฌ์ ์ธ ์œ„ํ˜‘์„ ์ฐพ๊ณ  ์กฐ์น˜ํ•˜์—ฌ ์•ˆ์ •์„ฑ์„ ํ™•๋ณดํ•˜๋Š” ์—ญํ• ์„ ํ•ฉ๋‹ˆ๋‹ค.ย 
โ€ฏย 

์—…๋ฌด ๋‚ด์šฉย 

  • ์ฟ ํŒก๊ณผ ๊ด€๋ จ๋œ ๊ตญ๋‚ด ๋ฐ ๊ธ€๋กœ๋ฒŒ ๋ณด์•ˆ ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค ๋ฆฌ์„œ์น˜ ๋ฐ ๋ถ„์„ย 

  • ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค ๋ฐ ์œ„ํ˜‘ ์ •๋ณด ์ˆ˜์ง‘ ๋ฐ ํ‰๊ฐ€ย 

  • ์ž ์žฌ์  ๋ณด์•ˆ ์œ„ํ˜‘ ์‹๋ณ„ ๋ฐ ์ž”์กด ์œ„ํ—˜ ํ‰๊ฐ€ ๋ฐ ์กฐ์น˜ย 

  • ์‹๋ณ„๋œ ๋ณด์•ˆ ์œ„ํ˜‘ ์กฐ์น˜๋ฅผ ์œ„ํ•œ ์ฟ ํŒก ๋‚ด ์ •๋ณด ์†Œ๋น„์ž์™€ ์†Œํ†ตย 

  • SIEM ๋ฐ CTI ์†”๋ฃจ์…˜์„ ํ™œ์šฉํ•œ ์ด์ƒ ์ง•ํ›„ ํƒ์ง€ ์ •์ฑ… ๋ฐ ๋ฃฐ ๊ฐœ๋ฐœย 

  • CTI ๊ธฐ๋ฐ˜์˜ ํƒ์ง€ ์ •์ฑ… ๊ตฌ ๋ฐ ๊ด€๋ฆฌย 

  • CTI ๊ธฐ๋ฐ˜์˜ Threat Huntingย 

  • CTI ์—…๋ฌด์— ํ•„์š”ํ•œ ์ž๋™ํ™” ๊ตฌํ˜„ย 

  • CTI ์—…๋ฌด์˜ ๊ณ ๋„ํ™”ย 

โ€ฏย 

์ž๊ฒฉ ์š”๊ฑด:ย 

  • ์ •๋ณด๋ณดํ˜ธ ์‹ค๋ฌด ๊ฒฝํ—˜ 12๋…„ ์ด์ƒ ๋ฐ ์นจํ•ด์‚ฌ๊ณ  ๋Œ€์‘ ์—…๋ฌด ๊ฒฝ๋ ฅ 6๋…„ ์ด์ƒย 

  • ๋ณด์•ˆ ์œ„ํ˜‘ ๋™ํ–ฅ, ์นจํ•ด ๋ฐ ๋ฐฉ์–ด ๊ธฐ๋ฒ•, ์•…์„ฑ์ฝ”๋“œ์— ๋Œ€ํ•œ ์ง€์‹๊ณผ ํ•ด๋‹น ๋ถ„์•ผ์—์„œ์˜ ๊ฒฝํ—˜ย 

  • CTI ๋„๊ตฌ ๋ฐ ์†”๋ฃจ์…˜ ํ™œ์šฉ ๊ฒฝํ—˜ย 

  • ์ˆ˜์ง‘๋œ CTI ๊ธฐ๋ฐ˜์˜ ์นจํ•ด ์˜ˆ๋ฐฉ ๊ฒฝํ—˜ย 

  • Attack Surface Monitoring ๋ฐ ํƒ์ง€ ๋‚ด์—ญ ๋Œ€์‘ ๊ฒฝํ—˜ย 

  • ๋Œ€์šฉ๋Ÿ‰์˜ ๋กœ๊ทธ ๊ธฐ๋ฐ˜์œผ๋กœ ์ด์ƒ ์ง•ํ›„ ํƒ์ง€ ๋ฐ ๋ถ„์„ ๊ฒฝํ—˜ย 

  • ํšจ๊ณผ์ ์ธ ์ปค๋ฎค๋‹ˆ์ผ€์ด์…˜๊ณผ ๋ณด๊ณ ์„œ ์ž‘์„ฑ ๋Šฅ๋ ฅ ์š”๊ตฌย 

  • ์ƒˆ๋กœ์šด ๋ณด์•ˆ ๊ธฐ์ˆ ๊ณผ ํŠธ๋žœ๋“œ์— ๋Œ€ํ•œ ์ง€์†์ ์ธ ํ•™์Šต๊ณผ ๊ณต์œ ์— ์ ๊ทน์ ์œผ๋กœ ์ฐธ์—ฌํ•˜๋Š” ์˜์ง€ ํ•„์š”ย 

  • ์‹ ์†ํ•œ ์œ„ํ˜‘ ๋Œ€์‘ ๋Šฅ๋ ฅ๊ณผ ์žฅ๊ธฐ์ ์ธ ์‚ฌ์ด๋ฒ„ ์œ„ํ˜‘ ํŠธ๋žœ๋“œ๋ฅผ ๋ถ„์„ํ•˜๊ณ  ์˜ˆ์ธกํ•˜๋Š” ๋Šฅ๋ ฅ ์š”๊ตฌย 

  • ํ•™์‚ฌํ•™์œ„ ์ทจ๋“์ž ๋˜๋Š” ๋™๋“ฑํ•œ ์ˆ˜์ค€์˜ ์‹ค๋ฌด ๊ฒฝํ—˜ ๋ณด์œ ์žย 

  • ๋ฌธ์ œ ํ•ด๊ฒฐ ๋Šฅ๋ ฅ ๋ฐ ์šฐ์ˆ˜ํ•œ ์˜์‚ฌ์†Œํ†ต ๊ธฐ์ˆ ย 

โ€ฏย 

์šฐ๋Œ€ ์‚ฌํ•ญ:ย 

  • ๋ณด์•ˆ ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค ๊ด€๋ จ ์„œ๋น„์Šค ์šด์˜, ๋ถ„์„ ๊ฒฝํ—˜ย 

  • Threat Hunting ์œ ๊ฒฝํ—˜์žย 

  • ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„ ๊ฒฝํ—˜ย 

  • ์ด์ปค๋จธ์Šค ์—…๊ณ„๊ด€๋ จ ๋ณด์•ˆ์œ„ํ˜‘ ์ „๋ฌธ ์ง€์‹ ๋ฐโ€ฏํด๋ผ์šฐ๋“œ ํ”Œ๋žซํผ(์˜ˆ: AWS, Azure) ๊ด€๋ จ ์ง€์‹์„ ๋ณด์œ ํ•˜์‹  ๋ถ„ย 

  • ์›น ์„œ๋น„์Šค(HTTP, HTML, AWS, REST, SOAP, Atom) ๊ฐœ๋ฐœ ๋ฐโ€ฏ์ž๋™ํ™” ๋ฐ ์Šคํฌ๋ฆฝํŠธ(Linux shell, Python, Perl, Powershell) ๊ฐœ๋ฐœ ๊ฒฝํ—˜์„ ๋ณด์œ ํ•˜์‹  ๋ถ„ย 

  • ๋Œ€์šฉ๋Ÿ‰ ๋กœ๊ทธ ์ˆ˜์ง‘๊ด€๋ฆฌ(ELK, Splunk, ๋“ฑ), TSDB(Time Series DB) ๊ฐœ๋ฐœ ๊ฒฝํ—˜์„ ๋ณด์œ ํ•˜์‹  ๋ถ„ย 

  • DevOps, DevSecOps, ๋ฐ ์• ์ž์ผ ๋ฐฉ์‹์— ๋Œ€ํ•œ ์ง€์‹ ๋˜๋Š” ์—…๋ฌด๊ฒฝํ—˜ ๋ฐโ€ฏOWASP, Diamond model, MITRE ATT&CK ๊ด€๋ จ ์ง€์‹ ๋˜๋Š” ์ ์šฉ ๊ฒฝํ—˜์„ ๋ณด์œ ํ•˜์‹  ๋ถ„ย 

  • ํ•œ๊ตญ์–ด ๋ฐ ์˜์–ด๊ฐ€ ๊ฐ€๋Šฅํ•˜์‹  ๋ถ„์œผ๋กœโ€ฏ์œ ๊ด€ ๋ถ„์•ผ ์ž๊ฒฉ์ฆ(CISSP, CISA, CCNA, CISM) ํ•˜๋‚˜ ์ด์ƒ์„ ๋ณด์œ ํ•˜์‹  ๋ถ„ย 

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index ๐Ÿ’ฐ

Job stats:  29  0  0

Tags: AWS Azure Blue team CISA CISM CISSP DART DevOps DevSecOps ELK Linux MITRE ATT&CK Monitoring OWASP Perl PowerShell Python SIEM Splunk Threat intelligence

Region: Asia/Pacific
Country: South Korea

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.