Endpoint Security & Threat Hunting Specialist

Taipei, Taiwan

Crypto.com

Over 80 million users buy, sell, and trade Bitcoin, Ethereum, NFTs and more on Crypto.com. Join the World's leading crypto trading platform.

View company page

The Cybersecurity and Data Privacy team reports directly under the office of the CISO headed by Chief Information Security Officer (CISO) Jason Lau (https://www.linkedin.com/in/jasonciso/) who has over 23+ years of experience in the cybersecurity space, awarded Global Top 100 CISO, and also serves on the World Economic Forum, International Association of Privacy Professionals and more. The team comprises of multiple functions from Blockchain Security, Operational Security, Security Governance and Compliance and more. We drive a culture of having a growth mindset and being humble to help everyone achieve their potential. Security and Data Privacy Compliance first strategy which has been at the core of our company. The security team helped to drive us to be the first Crypto company worldwide to achieve ISO27001, ISO27701, ISO22301 and PCI:DSS 3.2.1 (Level 1) certifications. Extremely detailed third party attested by international audit firm SGS and achieved "Adaptive (Tier 4)" – the highest level possible for the US National Institute of Standards and Technology (NIST) Cybersecurity Framework and the latest NIST Privacy Framework as well as SOC2 and many other regional certifications like the Data Protection Trust Mark.
We are looking for an intermediate level security specialist to join our Global Cyber Fusion Center. The role will support our continuous threat monitoring, hunting & response capabilities; and be a key contributor to key endpoint security projects & initiatives.

Responsibilities

  • Threat Monitoring Investigations - deep dive into Tier 1 & Tier 2 security operations escalations, performing incident triage and root cause analysis.
  • Proficient in performing investigations using open source and proprietary tools, including but not limited to - EPP/EDR/XDR software, Digital Forensics tools/software, SIEM platforms, etc.
  • Threat Hunting - Proficient in Threat Hunting methodologies. Able to plan and execute Threat Hunts using available data sources and security tools.
  • Incident Response - Proficient in end-to-end Incident Response. Able to take the lead and provide guidance during investigations and incidents to pivot the investigation, drive containment, mitigation and other security outcomes.
  • Security Projects - Lead projects and initiatives that may involve - Endpoint Security enhancements, Threat Hunting, Compromise Assessments, Network/Endpoint security reviews, etc. Endpoint Security - support the deployment, configuration and maintenance of Endpoint Security Software/Tools - including but not limited to - EPP/EDR/XDR software, Digital Forensics tools/software, SIEM/log collection agents, etc. 
  • Leadership - Be comfortable with cross-functional leadership and stakeholder management. Be willing to lead and nurture a small team of junior security specialists. 

Requirements

  • 5-7 years of experience in Information Security, with technical hands-on experience in Security Operations, Digital Forensics, Incident Response, Endpoint Security or Cloud Security. 
  • Working Experience with SIEM, EPP/EDR/XDR, SOAR, Cloud Security (CSPM, Container Security, etc), Digital Forensics software & tools.
  • Working experience with Cloud environments like AWS and Azure.
  • Experience in using scripting languages to automate tasks and manipulate data or programming experience is a bonus.
  • Management experience is a bonus.
  • Highly self-motivated, attention to detail and outcome driven.
  • Proficiency in verbal and written English. 
  • On-call is required.
#LI-MK1#Hybrid
Life @ Crypto.com Empowered to think big. Try new opportunities while working with a talented, ambitious and supportive team.Transformational and proactive working environment. Elevate employees to find thoughtful and innovative solutions.Growth from within. We help to develop new skill-sets that would impact the shaping of your personal and professional growth.Work Culture. Our colleagues are some of the best in the industry; we are all here to help and support one another.One cohesive team. Engage stakeholders to achieve our ultimate goal - Cryptocurrency in every wallet.   Are you ready to kickstart your future with us?  Benefits Competitive salary Medical insurance package with extended coverage to dependents Attractive annual leave entitlement including: birthday, work anniversaryWork Flexibility Adoption. Flexi-work hour and hybrid or remote set-upAspire career alternatives through us. Our internal mobility program can offer employees a diverse scope.  Work Perks: crypto.com visa card provided upon joining  Our Crypto.com benefits packages vary depending on region requirements, you can learn more from our talent acquisition team. About Crypto.com: Founded in 2016, Crypto.com serves more than 80 million customers and is the world's fastest growing global cryptocurrency platform. Our vision is simple: Cryptocurrency in Every Wallet™. Built on a foundation of security, privacy, and compliance, Crypto.com is committed to accelerating the adoption of cryptocurrency through innovation and empowering the next generation of builders, creators, and entrepreneurs to develop a fairer and more equitable digital ecosystem. Learn more at https://crypto.com.  Crypto.com is an equal opportunities employer and we are committed to creating an environment where opportunities are presented to everyone in a fair and transparent way. Crypto.com values diversity and inclusion, seeking candidates with a variety of backgrounds, perspectives, and skills that complement and strengthen our team. Personal data provided by applicants will be used for recruitment purposes only. Please note that only shortlisted candidates will be contacted.
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: AWS Azure Blockchain CISO Cloud Compliance Crypto CSPM EDR Endpoint security Forensics Governance Incident response ISO 22301 ISO 27001 Monitoring NIST Open Source Privacy Scripting SIEM SOAR SOC 2 Strategy XDR

Perks/benefits: Career development Competitive pay Health care Medical leave Salary bonus

Region: Asia/Pacific
Country: Taiwan
Job stats:  6  1  0
Category: Threat Intel Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.