What are the responsibilities and job description for the Cyber Security Engineer (Threat Hunting & Penetration Testing) position at Pacific Premier Bank?
Cyber Security Engineer with a focus on Penetration Testing, Threat Hunting, Red/Blue Team, and Threat Intelligence, you will play a crucial role in ensuring the security of the Bank's systems, networks, and infrastructure from potential cyber threats. Your primary responsibility will be to identify vulnerabilities, simulate real-world attacks, proactively and iteratively hunt for threats, and provide actionable intelligence to enhance the organization's security posture. You will collaborate with cross-functional teams to assess and mitigate risks, respond to security incidents, and develop strategies to defend against emerging threats.
RESPONSIBILITIES
- Conduct offensive security assessments including penetration tests on systems, applications, and network infrastructure to identify vulnerabilities and potential attack vectors.
- Defensive Analysis: Utilize both automated and manual techniques to simulate real-world attacks and test defensive measures, security controls and monitoring capabilities.
- Document and present detailed reports on findings, including recommended remediation strategies and security best practices.
- Proactively search for signs of advanced persistent threats (APTs) and perform active reconnaissance to identify potential risks and vulnerabilities.
- Simulate real-world attacks to test the effectiveness of the bank's security controls, incident response capabilities, and overall resilience.
- Identify and track threat actor Tactics, Techniques, and Procedures (TTPs).
- Use a variety of tools, techniques, and threat intelligence sources to analyze logs, network traffic, and system behavior to identify potential indicators of compromise (IOCs).
- Collaborate with the incident response team to investigate and respond to identified threats, minimizing the impact and preventing further attacks.
- Collaborate with the Cyber Operations team to identify and close security gaps, improve incident response processes, and enhance overall defensive capabilities.
- Assist in the development and execution of tabletop exercises and simulations to test the organization's incident response readiness and identify areas for improvement.
- Monitor and analyze threat intelligence sources to identify emerging threats, attack trends, and indicators of compromise relevant to the banking industry.
- Stay updated with the latest security threats, attack techniques and vulnerabilities, and use this knowledge to enhance purple team operation and defense strategies.
- Collaborate with external threat intelligence providers and participate in threat-sharing communities.
- Collaborate with the incident response team to provide technical expertise during security incidents and assist in containment, eradication, and recovery efforts.
- Develop incident response playbooks and procedures specific to penetration testing, red teaming, and threat hunting scenarios.
- Conduct Digital Forensics investigations and Malware Analysis to identify malicious activity and derive Indicators of Compromise (IOCs)
- Serve as an Incident Responder on the cybersecurity incident response team with a periodic on-call requirement.
- Contribute to security awareness and training programs to educate bank staff on emerging threats, phishing, and social engineering techniques.
- Conduct technical training sessions for IT teams to enhance their understanding of penetration testing, threat hunting, and red teaming methodologies.
- Coach and mentor junior team members to enhance and mature capabilities and team processes.
- Contribute to reporting on the team's operational metrics and KPIs.
QUALIFICATIONS
- Minimum 5 years of recent experience working as a cybersecurity professional.
- In-depth knowledge of common vulnerabilities, attack vectors, and penetration testing methodologies.
- Subject matter expertise in at least one of the following areas: Cyber Threat Hunting, Malware Analysis & Reverse Engineering, Cyber Threat Intelligence, Digital Forensics, Incident Response, Penetration Testing.
- Experience with using a scripting language such as Python or PowerShell for task automation or tool creation is desirable.
- Familiarity with threat intelligence platforms, SIEM solutions, and security analytics tools.
- Proficient in using various penetration testing tools and frameworks (e.g., Kali Linux, Metasploit, Burp Suite).
- Strong understanding of network protocols, web application security, and secure coding practices.
- Relevant certifications such as OSCP, OSCE, CISSP, or GCIH, GREM, GCFA, GCTI, CREST certifications are preferred.
A reasonable, good faith estimate of the minimum and maximum base salary or pay for this position is $40.90/hr to $67.48/hr. Actual compensation will vary based on various factors including but not limited to location, experience, and performance. A discretionary bonus and/or business line incentive may be provided, in addition to a medical and other benefits, dependent on the position. For more information regarding our benefits, please visit
#LI-Onsite
#LI-FG1
Salary : $41 - $67