Job Detail
| Salary |
Negotiable |
| Experience |
3 years - 6 years |
| Category |
IT/Software |
| Job Type |
Full-time |
| Posted Date |
Wed Dec 31, 2025 |
| Apply before : |
Mon Aug 23, 2027 |
| Keyskills |
Not Mentioned |
Job Summary
FalconX is a pioneering team of operators, investors, and builders committed to revolutionising institutional access to the crypto markets. Operating at the intersection of traditional finance and cutting-edge technology, FalconX addresses the industry& foremost challenges: Navigating the digital asset market can be complex and fragmented, with limited products and services that support trading strategies, structures, and liquidity found in conventional financial markets. As a comprehensive solution for all digital asset strategies from start to scale,FalconX operates as the connective tissue empowering clients with seamless navigation through the ever-evolving cryptocurrency landscape.
Job Description
Job Description
- Monitor, detect, and respond to security incidents across on-premise and cloud environments.
- Analyse security alerts from security tools to identify potential threats.
- Conduct forensic investigations and deep-dive analysis of security events to identify trends, attack techniques, and areas for improvement.
- Conduct proactive threat hunting across endpoint, network, and cloud environments to identify sophisticated cyber threats.
- Analyse security logs, behavioural patterns, and anomalies to detect indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs).
- investigate security incidents, perform forensic analysis, and provide actionable recommendations for mitigation and remediation.
- Develop and refine threat hunting methodologies, leveraging frameworks like MITRE ATT & CK and the Cyber Kill Chain.
- Automate threat detection and analysis using scripting languages such as Python, PowerShell, or Bash.
- Continuously monitor emerging threats, vulnerabilities, and attack trends to improve detection and response strategies.
Skills
- Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or a related field (or equivalent experience).
- 3+ years of experience in security operations, threat hunting, or a similar cybersecurity role.
- Experience working with log data for detection and response (Cloud, EDR,Network, and more)
- Experience developing and deploying effective detection rules (Yara,Sigma,SQL based rules,Network ,etc.)
- Strong understanding of network security monitoring, packet analysis, and log correlation.
- Deep understanding of advanced threat detection methodologies and threat intelligence.
- Proficiency in analysing attacker tactics, techniques, and procedures (TTPs)based on frameworks like MITRE ATT & CK.
- Proficiency in scripting and automation for security operations (Python,PowerShell, or Bash).
- Understanding of endpoint security, identity management, cloud security, detection engineering, vulnerability management, incident response, and threat intelligence.
- Excellent communication skills and ability to work collaboratively in a fast-paced environment.