Cybersecurity Consultant

2 months ago


Mackay Regional, Australia Dell GmbH Full time
About the Role

We are seeking a highly skilled Cybersecurity Consultant - Incident Response to join our team at Dell GmbH. As a key member of our cybersecurity team, you will be responsible for delivering emergency incident response services to our customers.

Key Responsibilities
  • Manage the technical and non-technical aspects of incident response, including conducting investigative analysis using digital forensics methods to determine the nature, scope, and root cause of cyber incident activity.
  • Formulate recommendations for security posture enhancement and develop tailored remediation plans to direct customer containment and recovery efforts.
  • Participate in a 24x7 on-call rotation for supporting requests from global incident response customers.
  • Travel as needed to assist customers with on-site incident response efforts.
Requirements
  • Minimum five (5) years of cybersecurity experience in complex operating environments.
  • Minimum three (3) years in a customer-facing support role (Security Engineer, Client Services, Consulting, Professional Services).
  • Minimum of two (2) years of host forensics, network forensics, and cloud forensics experience for threat hunting and incident response efforts.
  • GCIH, GCFE, GCFA, GREM or similar certifications.
  • Strong communication skills (oral and written) and ability to prioritize urgent tasks and work multiple consulting engagements concurrently.
Preferred Qualifications
  • Theoretical and practical knowledge in the following areas: Windows and Linux operating systems, AWS, Azure (including Microsoft 365), and GCP.
  • Exploits, vulnerabilities, intrusion vectors, and malware tactics, techniques, and procedures (TTPs) commonly employed by threat actors.
  • Host forensics, network forensics, and malware analysis techniques.
  • Network traffic analysis, endpoint activity analysis, and log analysis techniques.
  • Enterprise cyber incident management and response processes.
  • Enterprise cybersecurity controls and failure modes.
  • Modern Enterprise Detection and Response (EDR) tools.