Deception Technology Security Expert
CNS Cloud and Network Services
Lannion, France, France
il y a 6j

Job Description

Main Purpose of Role : Expert in areas of security deception solutions, Security Monitoring & Response services, responsible for development, implementation & delivery.

Performs & implements threat detection, hunting, incident monitoring, investigation & response activities are effectively delivered and enhanced for future. Main Responsibility Areas :

  • Telecom network threat use case for deception
  • Managed detection and response
  • Threat Intelligence & Threat hunting
  • Design & manage Deception Platform and Application
  • Key Tasks
  • Design & implement deception use cases for telecom network
  • Apply various analytical methods, tools, and techniques for implementing effective deception solution (e.g., competing hypotheses;
  • chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network / association or link analysis; etc.).

  • Develops and maintains deception platforms & processes to support enterprise mission needs; develops rules and requirements that describe baseline and target architectures.
  • Responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence.
  • Ensure timely detection, identification, and alerting of possible attacks / intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
  • Internal & external threat environment)

  • Create, update & manage the knowledgebase.
  • Deploy Security automation & response, threat intelligence & hunting capabilities
  • Support in development of incident response plans and procedures to ensure that business-critical services are recovered in the event of a security event
  • Perform review & analysis with stakeholders to help establish the lessons learnt, create & update new / existing processes & procedures to mature the security operations services & support.
  • Determine tactics, techniques, and procedures (TTPs) for intrusion sets..
  • Improve scoring and grading metrics for effectiveness of continuous monitoring program.
  • Key Competencies :

  • Experience in developing deception use cases, Threat hunting, Forensics solutions for telecom network
  • Skilled in denial and deception techniques and technology solutions
  • Skill in implementing, maintaining, and improving established network security practices.
  • Knowledge of configuring and utilizing network protection components and software-based computer protection tools (e.g.
  • Firewalls, VPNs, NIPS, HIDS, antivirus etc.).

  • Skilled in troubleshooting and diagnosing cyber defence infrastructure anomalies and work through resolution.
  • Skilled in system, network, and OS hardening techniques. (e.g., remove unnecessary services, password policies, network segmentation, enable logging, least privilege, etc.).
  • Skill in protecting a network against malware. (e.g., NIPS, anti-malware, restrict / prevent external devices, spam filters).
  • Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol TCP and Internet Protocol IP , Open System Interconnection Model OSI , Information Technology Infrastructure Library, current version ITIL ).
  • Knowledge of specific operational impacts of cybersecurity lapses.
  • Knowledge of Vulnerability Management, Penetration Testing principles, Secure configuration and Application Security tools, and techniques.
  • Knowledge of network security architecture concepts and principles (e.g., application of defense-in-depth).
  • Good written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate security and risk-related concepts to technical and nontechnical audiences at various hierarchical levels
  • Poise and ability to act calmly and competently in high-pressure, high-stress situations
  • Should be a critical thinker, with strong problem-solving skills
  • Experience & Certification :

  • 8 to 15 years of total experience
  • Minimum 5 years of recent and relevant experience
  • Security Certifications (Active certification preferred)
  • OSCP (Offensive Security Certified Professional)
  • CEH (Certified Ethical Hacker)
  • CompTIA PenTest+
  • Degree in computer, electrical, software, or systems engineering, graduate degree preferred Additional Information

    Signaler cette offre d'emploi

    Thank you for reporting this job!

    Your feedback will help us improve the quality of our services.

    Mon email
    En cliquant sur « Continuer », je consens au traitement de mes données et à recevoir des alertes email, tel que détaillé dans la Politique de confidentialité de neuvoo. Je peux retirer mon consentement ou me désinscrire à tout moment.
    Formulaire de candidature