您的位置:首頁(yè) >汽車 >

        特斯拉汽金大全已更新2023(實(shí)時(shí)/更新中)|環(huán)球簡(jiǎn)訊

        2023-05-27 15:29:25    來(lái)源:搜狐汽車

        特斯拉汽金大全已更新2023(實(shí)時(shí)/更新中):00861-37566-43074 二:00861-59440-85159 THE ROLE

        We are looking for a highly motivated engineer specializing in security process automation and incident response to defend Tesla’s information, infrastructure, and products.

        It"s fun to work in a company where employees believe in what they"re doing! The Detection and Incident Response Team is responsible for detecting and responding to threats against our corporate, manufacturing and production environments.


        (資料圖片)

        This is a technical role, which is involved in all aspects of the incident response life cycle and what technical steps are needed to automate the process of responding to a security incident. As an Incident Response Engineer, you will be an Incident Handler as part of the Detection and Incident Response team. You will protect Tesla by investigating, containing, remediating, and documenting security incidents. You will also help detection engineers to improve logging coverage, security tools tuning, suggest ideas and contribute to the new signals development process and automation to detect and respond to threats automatically and at scale.

        Your responsibilities will also include improving/documenting incident response procedures and playbooks, reporting, and developing and maintaining new automated processes to lower the meantime to remediation.

        RESPONSIBILITIES

        ? Participate in incident management calls and coordinate response, triage, recovery, and reporting of incidents.

        ? Monthly and quarterly incident analysis and stats reporting.

        ? Ongoing maintenance and improvements/tuning of automated incident response processes.

        ? Work closely with the Detection and Threat Intel engineers to detect, respond to alerts and provide timely response for the security incidents .

        ? Participate in incident response activities (including tabletop exercises) to verify existing playbooks and procedures and identify opportunities for improvement .

        ? Assessing and analyzing prior incidents for operational improvements, whether automated or manual.

        ? Continuous monitoring, tuning, hardening and improvement of the existing security rules and policies .

        ? Keeping existing runbooks up to date and creating new runbooks to improve processes/coverage .

        ? Analyze security data and report on threats and incidents across various platforms and environments.

        ? Monitor and analyze emerging threats, vulnerabilities, and exploits.

        ? Provide security monitoring and incident response services supporting the mission to protect Tesla.

        ? Security process improvement .

        REQUIREMENTS

        ? Excellent understanding and experience in multiple security domains such as intrusion detection, incident response, malware analysis, application security, and forensics.

        ? Experience detecting abuse and large-scale attacks in a diverse environment. .

        ? Experience in cloud environments (AWS preferred) and Linux containers and orchestration systems (Kubernetes preferred) .

        ? Knowledge of web-services such as API and REST .

        ? Experience with GIT or other version control systems .

        ? Basic understanding of the Security automation (SOAR) principles. As a bonus – ability to implement automated solutions outside of the scope of SOAR.

        ? Experience working with multiple stakeholders such as engineering/operations teams, internal business units, external incident response teams, and law enforcement throughout the incident lifecycle.

        ? Solid experience and the ability to analyze network traffic, endpoint indicators, IOCs. Ability to combine/search/correlate various log sources to identify potential threats, assess the potential damage, and recommend countermeasures.

        ? Familiarity with the following detection-related disciplines with deep experience in one or more:

        o Large scale analysis of log data using tools such as Splunk or ELK.

        o File system, memory, or live response on Windows, MacOS and/or Linux.

        o Analysis of network traffic from intrusion detection systems and flow monitoring systems.

        o Host level detection with tools such as auditd, os-query, SysMon

        ? Real world experience using at least one major SIEM system .

        ? Experience with Splunk is a bonus .

        ? Security Certifications (i.e. Security+, CISSP, CEH, SANS, etc.) is also a plus .

        關(guān)鍵詞:

        相關(guān)閱讀

        亚洲一区无码中文字幕乱码| 97亚洲熟妇自偷自拍另类图片| 久久综合日韩亚洲精品色| 欧美激情综合亚洲一二区| 亚洲伊人色一综合网| 久久精品国产亚洲av麻豆| 久久九九亚洲精品| 亚洲日韩精品射精日| 亚洲精品乱码久久久久久按摩 | 中文字幕第一页亚洲| 亚洲日本中文字幕天堂网| 亚洲AV无码一区二三区| 亚洲成a人片在线观看日本麻豆| 国产精品亚洲一区二区三区在线观看 | 亚洲综合婷婷久久| 久久精品国产亚洲av影院| 精品亚洲成a人片在线观看少妇 | 久久久无码精品亚洲日韩蜜臀浪潮 | 亚洲免费日韩无码系列| 亚洲一区精品伊人久久伊人| 亚洲午夜日韩高清一区| 在线精品亚洲一区二区三区| 一本久久a久久精品亚洲| 亚洲国产精品成人久久| 亚洲阿v天堂在线| 久久精品国产精品亚洲毛片| 亚洲色图黄色小说| 亚洲天堂2016| 亚洲成AV人片高潮喷水| 亚洲国产一区视频| 亚洲日本一区二区三区在线| 亚洲短视频男人的影院| 亚洲手机中文字幕| 亚洲欧美不卡高清在线| 亚洲成av人在片观看| 亚洲精品~无码抽插| 91亚洲精品第一综合不卡播放| 亚洲午夜精品在线| 亚洲精品无码你懂的| 亚洲人成国产精品无码| 国产亚洲高清不卡在线观看|