Назад
Company hidden
обновлено 8 дней назад

Incident Response Principal Consultant (Cybersecurity)

Формат работы
remote (только Japan)
Тип работы
fulltime
Грейд
principal
Английский
b2
Страна
Japan
Вакансия из списка Hirify.GlobalВакансия из Hirify RU Global, списка компаний с восточно-европейскими корнями
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Incident Response Principal Consultant (Cybersecurity): Leading and conducting advanced incident response investigations for global organizations with an accent on threat hunting, forensic analysis, and remediation planning. Focus on developing new methods to detect sophisticated attackers, guiding complex intrusion investigations, and providing strategic security recommendations.

Location: Remote (Japan)

Company

hirify.global is a global leader in cybersecurity, protecting organizations with the world's most advanced AI-native platform.

What you will do

  • Serve as technical lead for incident response engagements.
  • Develop and use new methods to hunt for bad actors across large datasets.
  • Conduct intrusion investigations, often under the direction of outside counsel.
  • Perform host and/or network-based forensics across Windows, Mac, and Linux platforms.
  • Produce high-quality written and verbal reports, presentations, and recommendations for key stakeholders.
  • Demonstrate industry thought leadership through blog posts, CrowdCasts, and public speaking events.

Requirements

  • Extensive experience conducting or managing incident response investigations, including targeted threats like APT, Organized Crime, and Hacktivists.
  • Background in using a variety of forensic analysis tools to determine the extent and scope of compromise.
  • Strong knowledge of network protocols, network analysis tools, and ability to perform analysis of associated network logs.
  • Ability to understand the capabilities of static and dynamic malware analysis.
  • Strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans.
  • Knowledge of secure network architecture, network operations, and Cloud Incident Response methodologies (AWS, Azure, GCP).
  • Japanese: Minimum high business level required for speaking and writing.
  • Travel: Up to 30% required, often on short notice.
  • Capable of completing technical tasks without supervision and strong project management skills.

Nice to have

  • GIAC Certified Incident Handler (GCIH), Certified Forensic Analyst (GCFA), or Certified Forensic Examiner (GCFE).
  • Certified Information Systems Security Professional (CISSP) or Certified Ethical Hacker (CEH).
  • Offensive Security certifications such as OSCP or OSCE.

Culture & Benefits

  • Market-leading compensation and equity awards.
  • Comprehensive physical and mental wellness programs.
  • Competitive vacation, holidays, and paid parental/adoption leaves.
  • Professional development opportunities for all employees.
  • Employee Networks, geographic neighborhood groups, and volunteer opportunities.
  • Vibrant office culture with world-class amenities and a Great Place to Work Certified™ status.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →