您的位置:首頁 >汽車 >

特斯拉汽金大全已更新2023(實時/更新中)|環球簡訊

2023-05-27 15:29:25    來源:搜狐汽車

特斯拉汽金大全已更新2023(實時/更新中):00861-37566-43074 二:00861-59440-85159 THE ROLE

We are looking for a highly motivated engineer specializing in security process automation and incident response to defend Tesla’s information, infrastructure, and products.

It"s fun to work in a company where employees believe in what they"re doing! The Detection and Incident Response Team is responsible for detecting and responding to threats against our corporate, manufacturing and production environments.


(資料圖片)

This is a technical role, which is involved in all aspects of the incident response life cycle and what technical steps are needed to automate the process of responding to a security incident. As an Incident Response Engineer, you will be an Incident Handler as part of the Detection and Incident Response team. You will protect Tesla by investigating, containing, remediating, and documenting security incidents. You will also help detection engineers to improve logging coverage, security tools tuning, suggest ideas and contribute to the new signals development process and automation to detect and respond to threats automatically and at scale.

Your responsibilities will also include improving/documenting incident response procedures and playbooks, reporting, and developing and maintaining new automated processes to lower the meantime to remediation.

RESPONSIBILITIES

? Participate in incident management calls and coordinate response, triage, recovery, and reporting of incidents.

? Monthly and quarterly incident analysis and stats reporting.

? Ongoing maintenance and improvements/tuning of automated incident response processes.

? Work closely with the Detection and Threat Intel engineers to detect, respond to alerts and provide timely response for the security incidents .

? Participate in incident response activities (including tabletop exercises) to verify existing playbooks and procedures and identify opportunities for improvement .

? Assessing and analyzing prior incidents for operational improvements, whether automated or manual.

? Continuous monitoring, tuning, hardening and improvement of the existing security rules and policies .

? Keeping existing runbooks up to date and creating new runbooks to improve processes/coverage .

? Analyze security data and report on threats and incidents across various platforms and environments.

? Monitor and analyze emerging threats, vulnerabilities, and exploits.

? Provide security monitoring and incident response services supporting the mission to protect Tesla.

? Security process improvement .

REQUIREMENTS

? Excellent understanding and experience in multiple security domains such as intrusion detection, incident response, malware analysis, application security, and forensics.

? Experience detecting abuse and large-scale attacks in a diverse environment. .

? Experience in cloud environments (AWS preferred) and Linux containers and orchestration systems (Kubernetes preferred) .

? Knowledge of web-services such as API and REST .

? Experience with GIT or other version control systems .

? Basic understanding of the Security automation (SOAR) principles. As a bonus – ability to implement automated solutions outside of the scope of SOAR.

? Experience working with multiple stakeholders such as engineering/operations teams, internal business units, external incident response teams, and law enforcement throughout the incident lifecycle.

? Solid experience and the ability to analyze network traffic, endpoint indicators, IOCs. Ability to combine/search/correlate various log sources to identify potential threats, assess the potential damage, and recommend countermeasures.

? Familiarity with the following detection-related disciplines with deep experience in one or more:

o Large scale analysis of log data using tools such as Splunk or ELK.

o File system, memory, or live response on Windows, MacOS and/or Linux.

o Analysis of network traffic from intrusion detection systems and flow monitoring systems.

o Host level detection with tools such as auditd, os-query, SysMon

? Real world experience using at least one major SIEM system .

? Experience with Splunk is a bonus .

? Security Certifications (i.e. Security+, CISSP, CEH, SANS, etc.) is also a plus .

關鍵詞:

相關閱讀

主站蜘蛛池模板: 三上悠亚电影在线观看| 亚洲欧美一区二区三区孕妇| 香蕉伊思人在线精品| 国产精品综合网| free性欧美极度另类性性欧美| 无码午夜人妻一区二区不卡视频 | 特黄特黄一级高清免费大片 | a级亚洲片精品久久久久久久| 成年人的免费视频| 久久男人的天堂色偷偷| 欧美三级在线看| 亚洲欧美色中文字幕在线| 男生和女生一起差差的视频30分| 四虎在线永久精品高清| 青娱乐欧美视频| 国产成人无码a区在线观看视频| 2022国产成人福利精品视频| 天堂8中文在线最新版在线| 一级做性色a爰片久久毛片| 无码专区天天躁天天躁在线| 久久天天躁狠狠躁夜夜网站| 最近更新的2019免费国语电影| 亚洲性色高清完整版在线观看| 灰色的乐园未增删樱花有翻译| 免费观看一级成人毛片| 美女被免费网在线观看网站| 国产乱码一区二区三区爽爽爽| 黄色网址大全免费| 国产欧美一区二区三区在线看| 无遮挡1000部拍拍拍免费凤凰 | 国产综合久久久久鬼色| 99精品免费观看| 夫不再被公侵犯美若妻| 一本大道香一蕉久在线影院| 成年美女黄网站色大免费视频| 久久久久性色av毛片特级| 日本高清免费aaaaa大片视频| 二区久久国产乱子伦免费精品| 欧美亚洲视频一区| 亚洲成A人片在线观看无码| 欧美综合国产精品日韩一|