Ares Operations-posted 3 months ago
$210,000 - $230,000/Yr
Full-time • Mid Level
Hybrid • New York, NY
1,001-5,000 employees

Over the last 20 years, Ares’ success has been driven by our people and our culture. Today, our team is guided by our core values – Collaborative, Responsible, Entrepreneurial, Self-Aware, Trustworthy – and our purpose to be a catalyst for shared prosperity and a better future. Through our recruitment, career development and employee-focused programming, we are committed to fostering a welcoming and inclusive work environment where high-performance talent of diverse backgrounds, experiences, and perspectives can build careers within this exciting and growing industry. Job Description PRIMARY FUNCTIONS AND ESSENTIAL RESPONSIBILITIES: Use monitoring and detection platforms to investigate anomalous and potentially risky activity Lead investigations, coordinating support from other teams where required Advise and assist in the onboarding and operationalization of a new Insider Threta tool. Evaluate other tooling as needed. Create standard operating procedures for investigations and cross-functional processes Prepare chain-of-evidence and engage with Legal counsel, if/when required Help establish and maintain investigative standards, workflows, and documentation practices Ensure investigative activities comply with legal, regulatory, and ethical requirements related to privacy, labor law, and corporate governance General Requirements: Candidate should be willing to work flexible hours when needed due to the nature of insider threats Candidate should be able to work in a hybrid capacity from the local Ares office Strong analytical , critical thinking, and problem-solving skills High level of personal integrity, and the ability to professionally handle confidential matters and show an appropriate level of judgment and maturity Ability to interact effectively at all levels with sensitivity to cultural diversity Ability to adapt as the external environment and organization evolves Passionate about Insider Threat and has the inclination to learn current technologies / concepts / improvements Experience with User and Entity Behavior Analytics (UEBA) platforms and methodologies. Ability to develop and tune behavioral baselines and anomaly detection models. Knowledge of cyber security frameworks and attack methodologies Understanding of common Attack methods and their SIEM signatures Understanding of network protocols (TCP/IP stack, SSL/TLS, IPSEC, SMTP/IMAP, FTP, HTTP etc.) Understanding of Operating System, Web Server, database, and Security devices ( firewall /NIDS/NIPS) logs and log formats Knowledge of physical security especially as it intersects with cybersecurity Understanding of Identity and Access Management, authentication, and authorization Understanding of cloud identity models, privileged access management, and data exfiltration risks in cloud environments Knowledge of intrusion detection methodologies and techniques for detecting host- and network- based intrusions via intrusion detection technologies Excellent verbal and written English communication skills Ability to prioritize tasks based on the risk they pose to the enterprise Exp erience working with Python, R, or Jupyter Notebooks for data analysis and threat modeling a plus, but not . Experience with the following tools would be an advantage, but not essential: SIEM ( e.g. Microsoft Sentinel, Splunk, Secur onix ) EDR/XDR ( e.g. SentinelOne , Carbon Black, Crowdstrike Falcon ) Vulnerability Management ( e.g. Tenable Nessus, Rapid7, Qualys) Attack Surface Management ( e.g. Shodan, Randori, HackerOne ) Network Detection and Response ( e.g. Vectra AI, Darktrace DETECT, ExtraHop Reveal) Insider Threat Management ( e.g. DTEX, Proofpoint ITM , Microsoft Insider Risk ) QUALIFICATIONS: Bachelor’s degree in Computer Science, Information Technology, Business or equivalent discipline or demonstrated requisite years of experience for on-the-job training. Recommended: Professional Certifications such as CISSP, CCSK, GIAC, or OSCP Between 10-15 years of experience in Enterprise Cybersecurity in the financial, government, military, law enforcement or technology sector Previous experience supporting or leading incident response or detection engineering functions Deep understanding of insider threat indicators, data exfiltration patterns, analyzing and correlating activities from different tools, and cybercrime tactics Experience with timely deliveries Experience preferred with threat hunting, incident response, SIEM, Data Loss Prevention and Insider Threat platforms. Experience with offensive security practices (e.g. red teaming, penetration testing) is an advantage Deep understanding and practice of operational security Candidate should be willing to work flexible hours when needed due to the nature of insider threats Candidate should be able to work in a hybrid capacity from the local Ares office Strong analytical, critical thinking, and problem-solving skills High level of personal integrity, and the ability to professionally handle confidential matters and show an appropriate level of judgment and maturity Ability to interact effectively at all levels with sensitivity to cultural diversity

  • Use monitoring and detection platforms to investigate anomalous and potentially risky activity
  • Lead investigations, coordinating support from other teams where required
  • Advise and assist in the onboarding and operationalization of a new Insider Threta tool.
  • Evaluate other tooling as needed.
  • Create standard operating procedures for investigations and cross-functional processes
  • Prepare chain-of-evidence and engage with Legal counsel, if/when required
  • Help establish and maintain investigative standards, workflows, and documentation practices
  • Ensure investigative activities comply with legal, regulatory, and ethical requirements related to privacy, labor law, and corporate governance
  • Candidate should be willing to work flexible hours when needed due to the nature of insider threats
  • Candidate should be able to work in a hybrid capacity from the local Ares office
  • Strong analytical , critical thinking, and problem-solving skills
  • High level of personal integrity, and the ability to professionally handle confidential matters and show an appropriate level of judgment and maturity
  • Ability to interact effectively at all levels with sensitivity to cultural diversity
  • Ability to adapt as the external environment and organization evolves
  • Passionate about Insider Threat and has the inclination to learn current technologies / concepts / improvements
  • Experience with User and Entity Behavior Analytics (UEBA) platforms and methodologies.
  • Ability to develop and tune behavioral baselines and anomaly detection models.
  • Knowledge of cyber security frameworks and attack methodologies
  • Understanding of common Attack methods and their SIEM signatures
  • Understanding of network protocols (TCP/IP stack, SSL/TLS, IPSEC, SMTP/IMAP, FTP, HTTP etc.)
  • Understanding of Operating System, Web Server, database, and Security devices ( firewall /NIDS/NIPS) logs and log formats
  • Knowledge of physical security especially as it intersects with cybersecurity
  • Understanding of Identity and Access Management, authentication, and authorization
  • Understanding of cloud identity models, privileged access management, and data exfiltration risks in cloud environments
  • Knowledge of intrusion detection methodologies and techniques for detecting host- and network- based intrusions via intrusion detection technologies
  • Excellent verbal and written English communication skills
  • Ability to prioritize tasks based on the risk they pose to the enterprise
  • Bachelor’s degree in Computer Science, Information Technology, Business or equivalent discipline or demonstrated requisite years of experience for on-the-job training.
  • Between 10-15 years of experience in Enterprise Cybersecurity in the financial, government, military, law enforcement or technology sector
  • Previous experience supporting or leading incident response or detection engineering functions
  • Deep understanding of insider threat indicators, data exfiltration patterns, analyzing and correlating activities from different tools, and cybercrime tactics
  • Experience with timely deliveries
  • Deep understanding and practice of operational security
  • Experience working with Python, R, or Jupyter Notebooks for data analysis and threat modeling a plus, but not .
  • Experience with the following tools would be an advantage, but not essential: SIEM ( e.g. Microsoft Sentinel, Splunk, Secur onix ) EDR/XDR ( e.g. SentinelOne , Carbon Black, Crowdstrike Falcon ) Vulnerability Management ( e.g. Tenable Nessus, Rapid7, Qualys) Attack Surface Management ( e.g. Shodan, Randori, HackerOne ) Network Detection and Response ( e.g. Vectra AI, Darktrace DETECT, ExtraHop Reveal) Insider Threat Management ( e.g. DTEX, Proofpoint ITM , Microsoft Insider Risk )
  • Recommended: Professional Certifications such as CISSP, CCSK, GIAC, or OSCP
  • Experience preferred with threat hunting, incident response, SIEM, Data Loss Prevention and Insider Threat platforms.
  • Experience with offensive security practices (e.g. red teaming, penetration testing) is an advantage
  • Ares U.S. Core Benefits include Comprehensive Medical/Rx, Dental and Vision plans; 401(k) program with company match; Flexible Savings Accounts (FSA); Healthcare Savings Accounts (HSA) with company contribution; Basic and Voluntary Life Insurance; Long-Term Disability (LTD) and Short-Term Disability (STD) insurance; Employee Assistance Program (EAP), and Commuter Benefits plan for parking and transit.
  • Ares offers a number of additional benefits including access to a world-class medical advisory team, a mental health app that includes coaching, therapy and psychiatry, a mindfulness and wellbeing app, financial wellness benefit that includes access to a financial advisor, new parent leave, reproductive and adoption assistance, emergency backup care, matching gift program, education sponsorship program, and much more.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service