🌎
This job posting isn't available in all website languages

For Nokia Internal Employee access Log in here

Join us at Nokia to connect the world

Search jobs

Managed Detection- Threat modelling/use case

📁
Customer Services
💼
CNS Cloud and Network Services
📅
21000006VM Requisition #

About Cloud & Network Services

Cloud and Network Services is a leading Nokia business group that offers Network solutions on Core, Business and Enterprise segments, as well as Cloud solutions and Cognitive Services. It is a newly formed business group, that includes most of the former Nokia Software business, Nokia’s enterprise solutions, core network solutions including both voice and packet core, and managed and advanced services from its former Global Services unit. This unit will also act as a delivery channel of certain products from other business groups to enterprise customers. Cloud and Network Services (CNS) will target growth by leveraging the industry transition to cloud-based delivery, network-as-a-service business models, and software-led value creation.

 

Job Description

Develop strategy to detect, collect, analyze and exploit customized outputs from our Cyber Threat Intelligence partner and open-source intelligence to anticipate emerging cyber threats and get knowledge on threat actors, tactics, techniques, and procedures.

Develop strategy to performs cyber threat hunting on Indicators of Compromise (IoCs) through our security tools (EDR, SIEM, SOAR, etc.) to detect prior compromise.

 

Job Responsibilities & Competencies

Main Responsibility Areas:

  • Subject matter expert in threat and intelligence covering threat hunting

  • Develop practice around threat intelligence as a service

  • Develop practice around threat hunting as a service

  • Identify tools required

  • Identify skills and technologies required

  • Groom the delivery team on the technology and processes involved

  • Collect, analyse and exploit customized outputs from our Cyber Threat Intelligence partner and open-source intelligence to anticipate emerging cyber threats and get knowledge on threat actors, tactics, techniques and procedures:

  • Performs cyber threat hunting on Indicators of Compromise (IoCs) through our security tools (EDR, SIEM, SOAR, etc.) to detect prior compromise.

  • Verify, process, analyse, create report and disseminate the threat intelligence data to relevant stakeholders

  • Analyse on request the maliciousness of packages and files in sandbox and formalize synthesis

  • Provide SME support to delivery organization

  • Testing and PoC of use cases in lab environment

  • Support in building use case demos

  • Work with different product lines to validate and test the feasibility of security use cases

  • Build risk driven cyber attack scenarios with clear identification of threats, vulnerabilities, business impact, likelihood, approach, use case, scenarios, rules, remediation workflows or cyberplaybook.

  • Build and maintain connectors to integrate security products and network elements

 

Qualifications

Key Competencies:

  • Experienced in Threat Hunting & Analysis

  • Knowledge of Cyber Threat Intelligence, Ability to analyse reports, information on threat actors and emerging attack vectors

  • Experience with SIEM tools

  • Experience with tuning and optimization of SIEM rule sets, use cases (Ability to create and improve SIEM rules)

  • Experience in hunting techniques and tools like dark web scanning

  • Ability to understand business acumen for the threat intelligence gathered

  • Knowledge on MITRE ATT&CK framework

  • Knowledge on TTPs used in various types of attacks

  • Deep understanding of telecom technologies

  • Understanding of hacking techniques

  • Understanding of 3GPP security requirements, ITU-T x.805, ISO27001, NIST, Mitre attack framework

  • Security analytics

  • Understanding and working knowledge of SOC technologies like SIEM, SOAR, etc.

  • Scripting capabilities

 

Experience & Certification:

  • 8-12 years

  • Masters/bachelor’s in computer forensics, or related areas such as cyber security.

  • Relevant industry certification like CEH, CHFI

  • Malware analysis techniques

  • Proven record on Cloud Security domain or/and Security technologies augmented by AI would be highly appreciated

 

Imagine creating technology that has the potential to change the world. Working with us, you will have a positive impact on people’s lives and help to overcome some of the world’s most pressing challenges. We act inclusively and respect the uniqueness of people. At Nokia, employment decisions are made regardless of race, colour, national or ethnic origin, religion, gender, sexual orientation, gender identity or expression, age, marital status, disability, protected veteran status or other characteristics protected by law. Nokia culture welcomes people as their true selves. Come create technology that helps the world act together.

 

Previous Job Searches

My Profile

Create and manage profiles for future opportunities.

Go to Profile

My Submissions

Track your opportunities.

My Submissions
Life at Nokia
Explore Employee Blogs
We create the technology to connect the world

Stay in touch with us through our social media channels:

Follow us on Facebook
Follow us on LinkedIn
See us on Glassdoor
Follow us on Twitter

Similar Listings

CNS Cloud and Network Services

Lannion, France, France

📁 Customer Services

Requisition #: 21000006VZ

CNS Cloud and Network Services

Lannion, France, France

📁 Customer Services

Requisition #: 210000020P

CNS Cloud and Network Services

Lannion, France, France

📁 Customer Services

Requisition #: 21000006VW

Teams at Nokia

See all jobs

Research & Development

See new jobs

Market & Sales development

See new jobs

Corporate services

See new jobs
Nokia is an equal opportunity employer that is committed to diversity and inclusion. At Nokia, employment decisions are made regardless of race, color, national or ethnic origin, religion, gender, sexual orientation, gender identity or expression, age, marital status, disability, protected veteran status or other characteristics protected by law.