What We'll BringAt TransUnion, we have a welcoming and energetic environment that encourages collaboration and innovation we’re – consistently exploring new technologies and tools to be agile. This environment gives our people the opportunity to hone current skills and build new capabilities, while discovering their genius.
Come be a part of our team – you’ll work with great people, pioneering products and cutting-edge technology.
What You'll BringIdeally 3+ years of experience in penetration testing, threat hunting, incident response, and threat research
Track record of producing organized summaries and reports presenting technical information and security issues in manner suitable for various types of stakeholders
Experience in identifying, investigating, and responding to complex attacks
Knowledge of threat landscape in terms of TTPs, threat actors, and vectors for both commodity attacks and those of a more sophisticated nature.
Knowledge of network forensic analysis tools and techniques as well as experience with a combination of packet capture systems and tools
Knowledge of endpoint detection and response tools and techniques as well as experience with a combination of malware analysis and forensics tooling
Experience in a programming language, e.g. Python, PowerShell, etc.
Comfortable operating in a multi-OS environment, i.e. Win/Linux/Mac, whether on-prem or in the cloud and using virtualization technologies and cloud services.
Enthusiasm and interest for cybersecurity work!
Impact You'll MakeDiscover novel threat activity, anomalies, and security incidences using packet capture, endpoint security platforms and logged event data across the TransUnion network from a variety of sources both internal and external.
Participate in purple team efforts to simulate complex attacks and build resulting detections and prevention tooling across security stack
Research emerging TTPs and malware kits leveraging TransUnion’s Threat Intelligence team to drive threat hunting efforts and detection.
Lead response and investigation efforts into targeted attacks
Design custom tools for investigations, hunting, and research
Provide expertise in the design, implementation, and evaluation, of security platforms