Ais - Incident Response Engineer - Threat Analysis

Details of the offer

Imagine what you could do here. At Apple, new ideas have a way of becoming extraordinary products, services, and customer experiences very quickly. Bring passion and dedication to your job and there's no telling what you could accomplish. We're a diverse collection of thinkers and doers, continually reimagining our products, systems, and practices to help people do what they love in new ways. This is a deeply collaborative place, where everything we create is the result of people in different roles and teams working together to make each other's ideas stronger. That same passion for innovation that goes into our products also applies to our practices, strengthening our commitment to leave the world better than we found it.
DescriptionApple is seeking a security professional to join its Information Security Response Organization, as part of the Threat Analysis and Incident Response function. A successful candidate will possess a proven technical background, relevant Information Security experience with a strong focus in the Incident Response lifecycle. You will work with a global team of security professionals on a follow-the-sun model with a primary focus on the identification, containment, and mitigation of security incidents. This role is an integral part of the security controls Apple uses to protect its customers, brand, and data. This person will have the opportunity to work on technology and processes with global reach!
Minimum QualificationsExtensive experience in Information Security with a focus on Incident Response, Security Engineering, and/or Intrusion Detection.Proficient understanding of incident response automation strategies, with demonstrated ability to implement them.Proficient understanding of threat modeling, operational threat intelligence, and common attack vectors.Knowledge of web application vulnerabilities with ability to triage/verify OWASP Top 10 issues.In-depth technical knowledge of macOS or Linux Operating Systems.Preferred QualificationsExperience with disk and memory forensic tools.Experience writing and tuning IDS signatures.Exceptional analytical and investigative skills with hands-on experience, with demonstrated ability to analyze endpoint, network, and application logs.Proficient in one or more programming/scripting languages.Excellent verbal and written communication skills.
#J-18808-Ljbffr


Nominal Salary: To be agreed

Source: Jobleads

Requirements

Oracle Financials, Support Specialist

Description: We are seeking a talented individual to join our CIS (Corporate Information Solutions) Autonomous Finance Team team at Marsh.This role will be b...


Gb001 Marsh Ltd - England

Published 7 days ago

Servicenow Grc Developer

Our client is seeking an experienced ServiceNow GRC Developer for a 12-month contract. This role offers an exciting opportunity to lead critical Governance, ...


Linking Humans - England

Published 8 days ago

Staff Software Engineer

THE CARWOW GROUP Carwow Group is driven by a passion for getting people into cars. But not just any car, the right car. That's why we are building the go-to ...


Carwow - England

Published 7 days ago

Lead Configuration Analyst

At Bionic, we're making life radically easier for small business owners. We're building a one-stop shop for business essentials that's powered by smart techn...


Bionic Services Ltd - England

Published 7 days ago

Built at: 2024-11-22T06:21:55.479Z