Detect anomalous behaviours via IOCs Assess potential malicious nature Build and expand threat profile Describe adversary’s tactics Respond to threats identified where needed Background in Infocomm Security, Computer Science, Computer/Electrical Engineering, Information Technology Strong interest in
Overcome techniques employed to mask anomalous behaviours. Improve and automate validation or detection techniques. Identify alternate fingerprinting techniques to extend visibility. Assess adversary’s objectives, sophistication, resources and ops-security. Background in Infocomm Security, Computer
Get weekly curated job picks, salary trends, and career insights delivered to your inbox.