NoFluffJobs Stacjonarnie Mid

Incident Response Engineer

Motorola Solutions Systems Polska

⚲ Kraków

13 000 - 18 000 PLN (PERMANENT)

Wymagania

  • Incident Response
  • SIEM
  • SOAR
  • Mitre ATT&CK
  • Cyber Kill Chain

Opis stanowiska

O projekcie: Motorola Solutions is seeking a battle-tested Incident Response Engineer to join our world-class security program.You will lead investigations for high-impact events and a proactive hunter tasked with reducing attacker dwell time.  In addition you will lead projects to create new and improve our security capabilities. Wymagania: - 2+ years of experience in a similar position - Proven track record leading high-severity investigations and mentoring junior analysts through complex response efforts. - Advanced experience using SIEM (Palo Alto XIAM, Google SecOps, Splunk SIEM) and SOAR (Palo Alto XSOAR, XSIAM) tools to detect, investigate, and automate threats. - Deep familiarity with MITRE ATT&CK and the Cyber Kill Chain to identify and pivot on attack TTPs across Windows, Linux, and MacOS. - Ability to build tools and automate workflows using Python, PowerShell, or Bash. - Skilled at distilling complex technical data into succinct reports and able to support high-pressure incidents  - Willing to work during non-standard hours and be part of an on-call rotation schedule. Codzienne zadania: - Core Focus: Incident Leadership & Response - Lead High-Impact Incidents: Act as the primary Incident Response Lead (IRL) for complex security events, directing containment, eradication, and recovery. - Advanced Digital Forensics: Perform deep-dive analysis (host, memory, network) to determine breach scope and impact. - Root Cause & Remediation: Execute thorough Root Cause Analysis (RCA) and lead After-Action Reviews (AAR) to ensure every incident results in a permanent security improvement. - Containment Strategy: Develop and deploy immediate strategies to isolate threats and minimize organizational damage. - Detection, Analysis & Hunting - Proactive Threat Hunting: Design and execute hunt missions to identify undetected malicious activity. - Detection Engineering: Tune SIEM/EDR rules and develop high-fidelity detections based on Purple Team findings and emerging threat intel. - Malware Analysis: Conduct static and dynamic analysis to understand adversary TTPs and extract actionable IOCs. - SOC Escalation: Serve as the final technical authority for high-priority security anomalies. - Strategy & Process Improvement - Playbook Development: Create and refine IR plans, runbooks, and SOPs to automate repetitive tasks and increase efficiency. - Security Architecture: Evaluate and tune security tools (SOAR, EDR, SIEM) to enhance global posture. - Mentorship: Coach junior staff on advanced forensic techniques and investigative logic.