Sorry, this job is no longer available.

Principal Cyber Threat Engineer

Req ID: 42323

Job Family: Information Technology/Software Development

 

Sabre is the global leader in innovative technology that leads the travel industry. We are always looking for bright and driven people who have a penchant for technology and want to hone their skills. If you are interested in challenging work, being part of a global team, and solving complex problems through technology, business intelligence and analytics, and Agile practices - then Sabre is right for you! It is our people who develop and deliver powerful solutions that meet the current and future needs for our airline, hotel, and travel agency customers.

Job Description

Looking for a strong cyber security professional to join our Cyber Threat Management team. The ideal candidate will have extensive experience in network and endpoint forensics, incident response, and threat hunting methodologies utilizing Packet Inspection and NetFlow solutions. The ideal candidate will additionally have a well-rounded background in endpoint/network security defenses as well as some offensive security knowledge to allow the ability to think like an adversary. This role will work with other SOC Senior threat engineers to discern actual threats vs. false positives. This role will contribute to the incident response process to assess the risk, impact, and scope of identified security threats, as well as leading the response efforts to include containment, eradication, and recovery.

Work as a lead team member in the development of Cyber Threat Use Cases (Actionable Alerting/Reporting), to include development of test cases and response plans for each Use Case. This position will provide support and assists in the training/mentoring of junior security staff to increase their understanding of complex security analysis methodologies and issues. This position is required to collaboratively participate in threat research, analysis, correlation and development of original intelligence to enable predictive and actionable reporting.

Strong verbal and written communication skills are desired, in order to ensure thorough and accurate reporting during and concluding a security incident. Threat hunting efforts will be focused primarily on identifying advanced threats that are not detected via traditional security tools. As needed, perform reverse-engineering and malware analysis. Demonstrable experience in scripting/programing to further automate functions and analysis efforts. Regular collaboration with multiple teams both internal to the organization and managed services will be critical to succeed.

Provide awareness to internal teams and leadership on changes to the cyber threat landscape through various intelligence products. Publish internal threat intelligence products and intelligence briefings to provide actionable information to tactical and strategic stakeholders. Establish close relationships with business stakeholders outside of the security and compliance disciplines, working closely with physical security, fraud, legal, and senior leadership.

 

Job Requirements

Experience:

  • Minimum 7+ years’ experience in Information Technology
  • Minimum 3+ years’ experience in Information Security
  • Minimum 3+ years of Security Information and Event Management (SIEM/SIM/SEM) experience
  • Minimum 3 + years of experience with network security, endpoint security, or security threat vectors
  • Minimum 3+ years of Incident Response experience

 

Required Skills:

  • Excellent interpersonal skills
  • Ability to manage complex issues and develop solutions
  • Detail-oriented, excellent communication (oral and written), interpersonal, organizational, and presentation skills.
  • Knowledge and understanding of malware reverse engineering including: code or behavior analysis for endpoints and the network
  • Ability to execute in a fast paced, high demand, environment while balancing multiple priorities
  • Strong understanding of attacker tools, techniques, and methodologies. Ability to gather and act on cyber threat intelligence.
  • Knowledge of and ability to identify attack methods (TTPs) along with mitigation/detection techniques.
  • Strong collaborative skills and proven ability to work in a diverse team of security professionals

 

Required Education:

Bachelor Degree or Computer Science degree or equivalent

 

Preferred Certification:

Certification in one or more of the following: Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), GIAC Reverse Engineering Malware (GREM), GIAC Certified Forensic Analyst (GCFA), GIAC Network Forensics Analyst (GNFA), Offensive Security (OSCP/OSCE/etc), or other relevant certifications.

 

Reasonable Accommodation

Sabre is committed to working with and providing reasonable accommodation to applicants with disabilities. Applicants applying for a Sabre position with a disability who require a reasonable accommodation for any part of the application or hiring process may contact Sabre's Employee Relations Department at [email protected]

 

Affirmative Action

Sabre is an equal employment opportunity/affirmative action employer and is committed to providing equal employment opportunities to minorities, females, veterans, and disabled individuals. EEO IS THE LAW

 

Stay connected with Sabre Careers

Company
Sabre
Posted
09/20/2018
Type
Full time
Location
Southlake, TX 76092, US