Hands-on Analytical Cyber Engineers are few and far between!
And we want just that. A talented cyber security engineer with a rock-solid understanding of all thing’s cyber security, an inquisitive analytical mindset with a can-do attitude and the certifications to back it up.
At Volaris, our business is acquiring, strengthening and growing vertical market technology companies. Our team oversees the cyber maturity, governance, risk management and compliance state of all our businesses (and there’s quite a few) no matter their industry, size or complexity.
We’re a small team with a broad remit, and we’re looking for an experienced cyber security professional to join the crew. Role location is not a key consideration for us, we have offices all over the place.
The position has global coverage, performing escalated, deep dive analysis and investigation of threats and alarms, liaising with security and IT partners (both internal and external) to expose the real-world threat level, and identify the most appropriate remediation methods to address these risks and where necessary roll your sleeves up to assist in their resolution.
Providing subject matter expertise for SIEM components and design.
Detect emerging threats across the environmentAsset discovery - active and passive network discovery
Vulnerability assessment – active network scanning, continuous vulnerability monitoring
Threat detection - network and host IDS, file integrity monitoring
Behavioral monitoring - NetFlow analysis, log normalization, service availability monitoring
SIEM - log management, event correlation, analysis, and reporting
Respond quickly to incidents and conduct thorough investigations
Participates in hunt missions using threat intelligence, analysis of anomalous log to detect and eradicate threat actors
Identify the most appropriate remediation methods to address these risk and where appropriate assist in their resolution.
Keep abreast of threat actor tactics, techniques, and procedures (TTPs), and their associated Indicators of Compromise (IOCs)
Measure, manage, and advise of compliance status (PCI, HIPAA, ISO, and more)
Participate in and drive optimization of the existing security investments and reduce risk
We want a specialist, someone with demonstrable knowledge and experience, so if you can match these, we’re interested.
Hugely important is that you are a motivated self-starter who can manage your own time and commitments to the business. You’ll also have
3-5 years in a network and/or security administration role.
Minimum 2 years as part of a Security Operation Centre (SOC) team.
Experience in developing SIEM correlation rules to detect new threats beyond current capabilities.
Network and web related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, HTTPS, routing protocols, etc.)
Real-world use of security tools (Kali, Metasploit, SIEM, protocol analyzers etc.)
Advanced Persistent Threats (APT), phishing and social engineering, gateway anti-malware.
You’ll be certified as
A CISSP with SSCP; GCFA; GCFE; GCIH, or MS/Linux administration certifications.
or hold a
BS in computer science and are SSCP; GCFA; GCFE or GCIH certified.
or you are a
SSCP or Associate (ISC)² with either GCFA; GCFE, GCIH or MS/Linux administration certifications
GCFE and GCIH
Here at Trapeze, we strive to ensure that our employees succeed in all aspects of their career. Our culture provides individuals with the ability and opportunity to collaborate, learn and grow. We encourage our employees to openly contribute ideas, whether you are a student, graduate, or current member of the team. From day one, you will be assigned tasks that are meaningful to both the success of our business and your career development.