- Company Name
- Trafigura
- Job Title
- IT Security Engineer
- Job Description
-
**Job title**
IT Security Engineer
**Role Summary**
Senior technical specialist focused on security operations, incident investigations, threat hunting, and security tool development. Acts as escalation point for SOC analysts and leads cross‑functional response efforts to protect enterprise assets.
**Expectations**
- Lead and coordinate complex security investigations, forensic analysis, and incident response.
- Design, implement, and maintain custom detection rules, playbooks, and automated response workflows.
- Continuously improve security monitoring, threat hunting, and defensive posture across network, endpoints, and cloud environments.
**Key Responsibilities**
- Conduct advanced forensic and malware analysis (memory, network, static).
- Develop and tune SIEM (Splunk ES or equivalent) content, detection rules, and threat‑intelligence integrations.
- Manage EDR (Microsoft Defender for Endpoint or equivalent) configuration, alert triage, and response automation.
- Execute regular threat‑hunting exercises to uncover hidden compromises.
- Perform root‑cause analysis and devise mitigation strategies for security incidents.
- Lead incident coordination, communicate with stakeholders, and document findings.
- Build and deploy scripts/tools (PowerShell, Python, Perl) for detection and response automation.
- Collaborate with security architecture teams to enhance overall defensive posture.
**Required Skills**
- 5+ years in cybersecurity with at least 3 years in SOC or incident‑response roles.
- Proficiency with SIEM platforms (Splunk Enterprise Security preferred).
- Advanced experience with EDR solutions (Microsoft Defender for Endpoint or equivalent).
- Strong forensic skills: memory (Volatility, etc.), network, and malware analysis.
- Scripting: PowerShell, Python, and/or Perl for automation and tool development.
- Deep knowledge of network security, endpoint hardening, AD/LDAP, and operating‑system security (Windows, Linux, macOS).
- Threat‑intelligence integration and detection strategy design.
- Excellent communication and leadership skills for SOC coordination.
**Required Education & Certifications**
- Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or related field (preferred).
- Certifications: GIAC Certified Incident Handler (GCIH), GIAC Reverse Engineering, or equivalent are advantageous but not mandatory.