FuntoNetwork is a specialized IT consulting firm focused on delivering proactive cybersecurity solutions, particularly in Managed Detection & Response (MDR) services. They are seeking a highly skilled Senior Cyber Security Engineer to join their MDR delivery team, responsible for threat hunting, incident response, and enhancing detection capabilities for clients.
Responsibilities:
- Conduct proactive, hypothesis-driven threat hunting across client environments to identify advanced and persistent threats
- Develop, refine, and deploy custom detection rules (SIEM queries, YARA, EDR logic) to enhance detection accuracy and coverage
- Analyze adversary TTPs (Tactics, Techniques, and Procedures) to evolve hunting methodologies and detection strategies
- Serve as the primary escalation point and lead investigator for complex security incidents
- Perform in-depth forensic analysis (endpoint, memory, network, cloud) to determine scope, root cause, and impact
- Lead remote containment, eradication, and recovery efforts in close coordination with client IT teams
- Act as a trusted technical advisor for assigned MDR clients, providing expert insights during security reviews and post-incident briefings
- Author and deliver detailed incident reports, executive summaries, and actionable remediation guidance
- Proactively recommend security improvements based on observed telemetry, threats, and client risk profiles
- Demonstrate deep expertise in our MDR technology stack (EDR/XDR, SIEM, network detection, threat intelligence platforms)
- Optimize tool configurations, integrations, and alert workflows to maximize detection efficacy and operational efficiency
- Contribute to the continuous improvement of MDR playbooks, runbooks, and standard operating procedures
- Mentor and provide technical guidance to junior Security Analysts and Engineers
- Develop and share threat intelligence briefings tailored to client industries
Requirements:
- Bachelors degree in Cybersecurity, Computer Science, or a related field, or equivalent hands-on experience
- Minimum of 5 years in hands-on security operations, with at least 2 years focused on threat hunting, incident response, or within an MDR/MSSP environment
- Deep technical experience with: EDR platforms (e.g., CrowdStrike, Microsoft Defender for Endpoint, SentinelOne)
- Deep technical experience with: SIEM solutions (e.g., Splunk, Microsoft Sentinel, Elastic) for advanced querying and investigation
- Deep technical experience with: Digital forensics and incident response (DFIR) methodologies and tools
- Proven ability to analyze malware, interpret attacker behavior, and conduct investigations across the cyber kill chain
- Strong knowledge of network protocols, OS internals (Windows, Linux, macOS), and cloud (AWS, Azure, GCP) security monitoring
- Excellent communication skills, with the ability to convey technical details clearly to both technical and executive audiences
- Industry certifications such as GCFA, GNFA, GCIH, OSCP, CySA+, or platform-specific credentials (Splunk, CrowdStrike)
- Experience in a consulting or client-facing MDR role
- Scripting proficiency (Python, PowerShell) for automation and tool creation
- Experience with adversary simulation tools (e.g., Cobalt Strike) and purple team exercises