Job Specifications
Over the last 20 years, Ares’ success has been driven by our people and our culture. Today, our team is guided by our core values – Collaborative, Responsible, Entrepreneurial, Self-Aware, Trustworthy – and our purpose to be a catalyst for shared prosperity and a better future. Through our recruitment, career development and employee-focused programming, we are committed to fostering a welcoming and inclusive work environment where high-performance talent of diverse backgrounds, experiences, and perspectives can build careers within this exciting and growing industry.
Job Description
PRIMARY FUNCTIONS AND ESSENTIAL RESPONSIBILITIES:
Use monitoring and detection platforms to investigate anomalous and potentially risky activity
Lead investigations, coordinating support from other teams where required
Advise and assist in the onboarding and operationalization of a new Insider Threta tool. Evaluate other tooling as needed.
Create standard operating procedures for investigations and cross-functional processes
Prepare chain-of-evidence and engage with Legal counsel, if/when required
Help establish and maintain investigative standards, workflows, and documentation practices
Ensure investigative activities comply with legal, regulatory, and ethical requirements related to privacy, labor law, and corporate governance
General Requirements
Candidate should be willing to work flexible hours when needed due to the nature of insider threats
Candidate should be able to work in a hybrid capacity from the local Ares office
Strong analytical, critical thinking, and problem-solving skills
High level of personal integrity, and the ability to professionally handle confidential matters and show an appropriate level of judgment and maturity
Ability to interact effectively at all levels with sensitivity to cultural diversity
Ability to adapt as the external environment and organization evolves
Passionate about Insider Threat and has the inclination to learn current technologies / concepts / improvements
Experience with User and Entity Behavior Analytics (UEBA) platforms and methodologies.
Ability to develop and tune behavioral baselines and anomaly detection models.
Knowledge of cyber security frameworks and attack methodologies
Understanding of common Attack methods and their SIEM signatures
Understanding of network protocols (TCP/IP stack, SSL/TLS, IPSEC, SMTP/IMAP, FTP, HTTP etc.)
Understanding of Operating System, Web Server, database, and Security devices (firewall/NIDS/NIPS) logs and log formats
Knowledge of physical security especially as it intersects with cybersecurity
Understanding of Identity and Access Management, authentication, and authorization
Understanding of cloud identity models, privileged access management, and data exfiltration risks in cloud environments
Knowledge of intrusion detection methodologies and techniques for detecting host- and network- based intrusions via intrusion detection technologies
Excellent verbal and written English communication skills
Ability to prioritize tasks based on the risk they pose to the enterprise
Experience working with Python, R, or Jupyter Notebooks for data analysis and threat modeling a plus, but not required.
Experience with the following tools would be an advantage, but not essential:
SIEM (e.g. Microsoft Sentinel, Splunk, Securonix)
EDR/XDR (e.g. SentinelOne, Carbon Black, Crowdstrike Falcon)
Vulnerability Management (e.g. Tenable Nessus, Rapid7, Qualys)
Attack Surface Management (e.g. Shodan, Randori, HackerOne)
Network Detection and Response (e.g. Vectra AI, Darktrace DETECT, ExtraHop Reveal)
Insider Threat Management (e.g. DTEX, Proofpoint ITM, Microsoft Insider Risk)
Qualifications
Bachelor’s degree in Computer Science, Information Technology, Business or equivalent discipline or demonstrated requisite years of experience for on-the-job training.
Recommended: Professional Certifications such as CISSP, CCSK, GIAC, or OSCP
Between 10-15 years of experience in Enterprise Cybersecurity in the financial, government, military, law enforcement or technology sector
Previous experience supporting or leading incident response or detection engineering functions
Deep understanding of insider threat indicators, data exfiltration patterns, analyzing and correlating activities from different tools, and cybercrime tactics
Experience with timely deliveries
Experience preferred with threat hunting, incident response, SIEM, Data Loss Prevention and Insider Threat platforms.
Experience with offensive security practices (e.g. red teaming, penetration testing) is an advantage
Deep understanding and practice of operational security
Candidate should be willing to work flexible hours when needed due to the nature of insider threats
Candidate should be able to work in a hybrid capacity from the local Ares office
Strong analytical, critical thinking, and problem-solving skills
High level of personal integrity, and the ability to professionally handle confidential matters and show an