This listing has expired and therefore is not publicly viewable.
|Preferred GIAC Certifications||GCIH, GISP, GSOC|
|Contact Name||Scott Kisser|
Skills and experience that will help you succeed:
Experience with AWS, Datadog, secure data ingestion and Incident Response (IR) process development and execution
Expertise in a broad range of security technology such as EDR, Network Traffic Analysis, Email Security Gateway, SASE, public cloud security, etc.
2+ years of experience in Tier 2 or Tier 3 Incident Response (IR) using data analytics and system forensics in production and corporate environments
Well versed in the latest adversary techniques, attack lifecycle, and incident response procedure
Incorporating public detections, community research, internal assessment results, and available threat intelligence into the team's overall detection capabilities
Proficient in security monitoring, log analysis and detection building from large datasets to automate Incident detection and response processes
Experience “threat hunting,” i.e. using threat intel to proactively and iteratively investigate potential risks and finding suspicious behavior in the network
Review the latest alerts to determine relevancy and urgency
Design, build and manage security monitoring and alerting tools
Swan is looking for Bitcoiners who are security minded builders and breakers! If you geek out on everything security related and like working with a passionate team of Bitcoiners that only care about doing what’s right for Bitcoin, you’ll be at home here.
This person will be responsible for creating the tooling and infrastructure that drives our detection and response pipelines. You will work closely with teams across the company to provide foundation tooling to scale detections across all environments.
As a member of our Threat Detection and Response team, you’ll be responsible for ensuring we have the proper visibility, detections, and operations to protect Swan Bitcoin, our customers and our ecosystem. You will work partner with engineering teams to to understand Swan Bitcoin’s attack surface and turn detections into preventions.