Summary The Threat Intelligence (TI) analyst is a self-motivated, independent, and critical thinker skilled in the application of threat intelligence for the enablement of a stakeholder’s network security. The qualified individual will address threat intelligence requirements and leverage Arete’s unique data to produce threat intelligence products such as briefings, threat actor profiles, flash reports, and technical reports. The TI analyst will conduct research with a focus on dark web and open-source data to develop high-quality assessments for both internal and external stakeholders. The Threat Intelligence Analyst will support the broader Threat Intelligence team by leveraging a solid foundation of technical knowledge of Cybersecurity, CTI, Dark Web, Incident response and Digital Forensics (DFIR) to successfully execute responsibilities. The APAC region is diverse, encompassing various countries with distinct technological landscapes, levels of cybersecurity maturity, and prevalent threat actors. This necessitates a specialized focus for threat intelligence professionals in this area. Threat actors in APAC can range from state-sponsored groups and sophisticated cybercriminal organizations to hacktivists with regional agendas. Understanding local laws, regulations, and data privacy requirements within APAC countries is also important for threat intelligence specialists, especially when dealing with cross-border threats and data sharing. Roles & Responsibilities Threat Monitoring and Analysis: Continuously monitor various threat intelligence sources, including open-source intelligence (OSINT), dark web forums, threat feeds (both commercial and open), and security vendor reports, with a specific focus on threats relevant to the APAC region. Analyze this data to identify emerging threats, trends, attack vectors, and threat actors targeting APAC. Regional Threat Landscape Expertise: Develop and maintain a deep understanding of the specific threat actors, campaigns, and geopolitical factors influencing the cyber threat landscape in APAC countries. This includes understanding the tactics, techniques, and procedures (TTPs) commonly employed by threat actors in this region. Threat Intelligence Production: Produce timely and relevant threat intelligence reports, briefings, and alerts tailored to different stakeholders, including technical teams, management, and sometimes clients. These reports should provide context, analysis, and actionable recommendations to mitigate risks. Indicator Management: Develop and manage threat indicators (IOCs) such as malicious domains, IP addresses, and file hashes, and ensure their effective dissemination and integration with security tools and monitoring systems. Vulnerability Analysis: Analyze vulnerabilities and exploits that are being actively used or are likely to be used in attacks within the APAC region, and provide insights to relevant teams for patching and mitigation efforts. Incident Response Support: Support incident response teams by providing relevant threat intelligence during security incidents, helping them understand the attacker's motives, TTPs, and potential impact. Threat Hunting Support: Collaborate with threat hunting teams by providing intelligence and context to proactively search for and identify hidden or advanced threats within the organization's network. Collaboration and Information Sharing: Collaborate with other security teams, industry peers, and potentially law enforcement agencies within the APAC region to share threat information and best practices. Tool and Platform Management: Utilize and manage threat intelligence platforms (TIPs) and other relevant tools for collecting, analysing, and disseminating threat data. Evaluate and recommend new tools and technologies to enhance threat intelligence capabilities. Customized Intelligence: Tailor threat intelligence gathering and analysis to the specific industry, business operations, and risk profile of the organization within the APAC context. Develop APAC specific quarterly / annual crimeware reports. Conduct dark web research by using knowledge of deep/dark web infrastructure, along with third-party resources to formulate hypotheses on the cybercrime ecosystem, such as initial access broker (IAB) activity, profiling ransomware affiliates, and more. Assist in the analysis and production of client-facing intelligence products, including email updates, briefing material, requests for information (RFIs), and other client requirements. Share meaningful insights about the context of an organisation’s threat environment that improve its risk management posture. Produce briefing material, written products, and graphics to convey analysis, both verbally and in writing, to a variety of audiences. Support client engagements by maintaining an understanding of networking principles and how adversaries could exploit network-related issues. Correlate threat intelligence to identify relevant threat activity and trends. Analyze the origins, pathways, and methodologies of malicious cyber activities to attribute, model and predict future intrusions. Contribute to the development and enhancement of threat intelligence tools, technologies, and processes to improve automation, data analysis, intelligence sharing, and service offerings. Collect accurate technical information from the client concerning the engagement to include, but not limited to, search terms, security incidents, client’s environment, size, and technologies in place. expertise, and sound analytical principles to drive forward client engagements. Appropriately manage expectations and communicate roadblocks to maintain stakeholder satisfaction throughout the intelligence process. May perform other duties as assigned by management. Skills And Knowledge Strong background and practical hands-on experience with Cyber Threat Intelligence concepts. Knowledge of ransomware groups with the ability to explain the current ransomware-as-a-service (RaaS) ecosystem, cybercriminal communications, IABs, and hypothesize on upcoming shifts within the threat landscape. Ability to work effectively in a fast-paced, dynamic environment and prioritize tasks to meet deadlines. Ability to correlate threat intelligence from the industry or region to observed activity impacting the customer. Knowledge of Cyber Threat Intelligence (CTI) frameworks like STIX, MITRE ATT&CK, the Lockheed Martin Cyber Kill Chain, or the Diamond Model. Previous experience with threat intelligence platforms such as ThreatConnect, MISP, or OpenCTI. Ability to work under a minimal supervision environment, maintaining high-quality analytical production and excellent relationships with stakeholders. Adaptable and willing to learn new technologies. Core Competencies: The Arete Threat Intelligence maps the core competencies required for the role to the U.S. National Initiative for Cybersecurity Careers and Studies (NICCS) Workforce Framework for Cybersecurity (NICE Framework) to aid in identifying applicable abilities, knowledge, skills, and appropriate supporting training. S0218: Skill in evaluating information for reliability, validity, and relevance. A0072: Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes. T0290: Determine tactics, techniques, and procedures (TTPs) for intrusion sets. K0001: Knowledge of computer networking concepts and protocols, and network security methodologies. K0002: Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). K0177: Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). K0362: Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). K0444: Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP). K0516: Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. K0565: Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. S0194: Skill in conducting non-attributable research. S0196: Skill in conducting research using deep web. S0256: Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioural relationships. T0617: Conduct nodal analysis. T0708: Identify threat tactics, and methodologies. Job Requirements 2-5 years of proven experience in cyber threat intelligence analysis, incident response, or a related field. Strong written and verbal communication skills, with the ability to present technical information to both technical and non-technical stakeholders. Experience taking non-traditional and creative approaches to solving problems and having the ability to quickly adapt as needed. Experience in using threat intelligence platforms and tools such as MISP, OpenCTI, etc. DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties, and skills required by personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodations may be made to enable people with disabilities to perform the essential functions of this job. TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Show more Show less
Summary The Associate IT Support Technician is responsible for ensuring operability of business-critical systems, setting, and measuring performance in accordance with Service Level Agreements (SLAs). This role derives data points to make informed, data-driven decisions, and serve as liaison between IT operations and business partners leveraging Arete platforms. This role works closely with multiple business units who utilize, develop, and maintain platforms and systems. IT Support Technician streamlines, automates, and builds efficiencies into operational processes, standardize outcomes, and improve service delivery both to internal clients, and by proxy, Arete clients who are engaged with the teams who utilize lab systems. Roles & Responsibilities Develops relationships within immediate team and is closely supervised Follows established procedures and methods to solve problems Provides world-class technical support by assigning and closing tickets, responding to requests, and working with team members to find the correct solution when documented procedures and knowledge articles do not address. Collaborates with internal departments for employee onboarding and offboarding efforts; including account set up and disablement, tracking of shipment & return of equipment Conducts our IT onboarding activities for new hires. This includes ensuring the new hire’s equipment is prepared ahead of their first day and facilitating new hire IT orientation sessions to acquaint them with Arete’s systems and programs Drives the use and improvement of our self-help resources including our internal knowledgebase, chatbots and self-service portals.. Coordinates efforts that result in intuitive experiences and excitement about the use of our space Coordinates the logistics and of our hardware assets; manage inventory of all hardware and software assets for the APAC Region. Tracks new and emerging trends in technology that affect and/or may benefit Corporate IT and internal customers Maintains and develop end-user and administrator documentation of end-user facing corporate IT systems/Services Demonstrates technical acumen and skill development of hardware, networking, security, and system administration skills through on the job training that could include but not limited to problem solving sessions, operational reviews, project work and other opportunities. Performs other duties as assigned by management Skills And Knowledge Excellent communication skills and professional demeanor Customer service focused Ability to multitask Excellent priority management and problem-solving skills Strong personal organization and time management skills Strong sense of teamwork and collaboration A high degree of empathy for our internal employees and feel the only measure of success is how well we fulfill their needs A demonstrated ability to create elegant documentation that empowers people to help themselves A passion for improving the human experience with technology at work An ability to communicate technical concepts and processes thoughtfully and effectively, no matter the audience The ability to manage projects and track progress accurately Experience using a ticketing system to triage and escalate tickets, preferred Ability to work independently with moderate supervision A proven track record of delivering high quality IT onboarding and support Experience working with and supporting mobile platforms (iOS, Android) and common office technology (meeting rooms, security badges, printers, AV support) Job Requirements Bachelor's Degree and 0-1 years related experience 3+ years of experience working in the technology field preferred Technical Certifications a plus Technical competencies in the following areas: Microsoft’s Office 365, Azure Active Directory, MDM Platforms, Windows 10, MacOS, iOS, Android OS, Hardware DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Show more Show less
ROLES & RESPONSIBILITIES Reviews alerts generated by SentinelOne and implements appropriate containment and mitigation measures Proficient in SIEM, with a focus on QRadar SIEM, as well as threat monitoring and hunting within SIEM environments. Analyzes payloads using JoeSandbox and escalates to the appropriate team as necessary Collaborates with the Forensics team to conduct threat hunting using identified Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) Assists the Tiger Team in targeted collections of systems based on identified malicious activities in the client's environment Conducts historical log reviews to support threat hunting efforts and ensures all malicious artifacts are mitigated in the SentinelOne console Examines client-provided documents and files to supplement the SOC investigation and mitigation strategy Conducts perimeter scans of client infrastructure and reports any identified vulnerabilities to the Tiger Team for appropriate escalation Manages client-related tasks within the ConnectWise Manage ticketing system as part of the Client Handling Lifecycle Creates user accounts in SentinelOne console for the client Generates Threat Reports showcasing activity observed within the SentinelOne product Executes passphrase exports as needed for client offboarding Submits legacy installer requests to ensure the team is properly equipped for deployment Provides timely alert notifications to the IR team of any malicious activity impacting our clients Assists with uninstalling/migrating SentinelOne Generates Ranger reports to provide needed visibility into client environments Manages and organizes client assets (multi-site and multi-group accounts) Applies appropriate interoperability exclusions relating to SentinelOne and client applications Performs SentinelOne installation / interoperability troubleshooting as needed Contributes to the overall documentation of SOC processes and procedures Participates in “Handler on Duty (HOD) shifts as assigned to support the TT client matters Internally escalates support ticket / alerts to Tier II-IV Analysts as needed May perform other duties as assigned by management SKILLS AND KNOWLEDGE Demonstrated knowledge of Windows and Unix operating systems Thorough understanding of Digital Forensics and Incident Response practices Proficiency in advanced analysis techniques for processing and reviewing large datasets in various formats Familiarity with TCP/IP and OSI Model concepts at a basic level Expertise in the Incident Response Life Cycle stages (Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned) Working knowledge of the MITRE ATT&CK framework at an intermediate level Proven ability to work independently and solve complex problems with little direction from management Highly detail-oriented and committed to producing quality work JOB REQUIREMENTS Associate’s degree and 6+ years of IT related experience or Bachelor’s Degree and 2-5 years related experience Current or previous knowledge of, or previous experience with, Endpoint Detection and Response (EDR) toolsets General knowledge of the Incident Handling Lifecycle Ability to communicate in both technical and non-technical terms both oral and written DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. PHYSICAL DEMANDS No physical exertion required Travel within or outside of the state Light work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force as frequently as needed to move objects TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. FLSA OVERTIME CATEGORY Job is exempt from the overtime provisions of the Fair Labor Standards Act. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. #LI Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. About Us Arete Incident Response is an elite team of the world’s leading cybersecurity and digital forensics experts who combat today’s sophisticated cyberattacks. We work tirelessly to provide unparalleled capabilities and solutions throughout the entire cyber incident life cycle. These include incident response readiness assessments and penetration tests as well as post-incident response, remediation, containment, and eradication services. We work in close collaboration with industry leaders and government agencies along with leading cybersecurity technology platforms to deliver an innovative, intelligence-based approach to solving our client’s toughest challenges. If you want to work with the most talented and experienced people in the industry with the desire to be a cyber hunter and industry expert, we want you to be a part of our team.
SUMMARY The Junior Data Analyst role supports the Structured Data Services Team Lead on active projects. This role involves understanding basic client requirements, reviewing documents, and identifying, gathering, analyzing, and extracting data over excel. The Junior Data Analyst also identifies patterns during reviews and updates the Senior Analyst or Team Lead. Meeting deadlines while maintaining accuracy and quality standards is crucial for this role. ROLES & RESPONSIBILITIES Analyzes documents and extracts relevant content based on project specifications, primarily using Excel and other file types Collaborates closely with the Team Lead to receive the latest updates and instructions on projects Performs data cleansing or formatting on the data extracted, using formulae or manual or program tools Identifies the correlation and issues using the data mining techniques Provides the data into comprehensible structures of organize and transform information Identifies the timing and indicators of data access based on the analysis Ensures integrity and quality in all project analyses Manages multiple projects daily Meets project targets consistently Performs additional duties as assigned by manager SKILLS AND KNOWLEDGE Basic understanding of document analysis especially in data breach review Knowledge in the Advanced Excel and basic other Microsoft applications (like Word, PowerPoint etc.) Knowledge with a common scripting or programming language, including Power Query and Python will be added advantage Basic verbal and written communication skills Understanding of attention to detail and time management skills Experience working in a team environment Flexible, adaptable, responsive, and positive Data Analytical Certifications would be preferred JOB REQUIREMENTS Bachelor's degree in Computer Science, Mathematics, Information Management, or Statistics with at least 0 to 2 years of Data Analyst experience Ability to work greater than 40 hours per week as needed DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. About Us Arete Incident Response is an elite team of the world’s leading cybersecurity and digital forensics experts who combat today’s sophisticated cyberattacks. We work tirelessly to provide unparalleled capabilities and solutions throughout the entire cyber incident life cycle. These include incident response readiness assessments and penetration tests as well as post-incident response, remediation, containment, and eradication services. We work in close collaboration with industry leaders and government agencies along with leading cybersecurity technology platforms to deliver an innovative, intelligence-based approach to solving our client’s toughest challenges. If you want to work with the most talented and experienced people in the industry with the desire to be a cyber hunter and industry expert, we want you to be a part of our team.
Summary The Junior Data Analyst role supports the Structured Data Services Team Lead on active projects. This role involves understanding basic client requirements, reviewing documents, and identifying, gathering, analyzing, and extracting data over excel. The Junior Data Analyst also identifies patterns during reviews and updates the Senior Analyst or Team Lead. Meeting deadlines while maintaining accuracy and quality standards is crucial for this role. Roles & Responsibilities Analyzes documents and extracts relevant content based on project specifications, primarily using Excel and other file types Collaborates closely with the Team Lead to receive the latest updates and instructions on projects Performs data cleansing or formatting on the data extracted, using formulae or manual or program tools Identifies the correlation and issues using the data mining techniques Provides the data into comprehensible structures of organize and transform information Identifies the timing and indicators of data access based on the analysis Ensures integrity and quality in all project analyses Manages multiple projects daily Meets project targets consistently Performs additional duties as assigned by manager Skills And Knowledge Basic understanding of document analysis especially in data breach review Knowledge in the Advanced Excel and basic other Microsoft applications (like Word, PowerPoint etc.) Knowledge with a common scripting or programming language, including Power Query and Python will be added advantage Basic verbal and written communication skills Understanding of attention to detail and time management skills Experience working in a team environment Flexible, adaptable, responsive, and positive Data Analytical Certifications would be preferred Job Requirements Bachelor's degree in Computer Science, Mathematics, Information Management, or Statistics with at least 0 to 2 years of Data Analyst experience Ability to work greater than 40 hours per week as needed DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Show more Show less
Roles & Responsibilities Reviews alerts generated by SentinelOne and implement appropriate containment and mitigation measures Analyzes payloads using JoeSandbox and escalates to the appropriate team as necessary Collaborates with the Forensics team to conduct threat hunting using identified Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) Assists the Tiger Team in targeted collections of systems based on identified malicious activities in the client's environment Conducts historical log reviews to support threat hunting efforts and ensures all malicious artifacts are mitigated in the SentinelOne console Examines client-provided documents and files to supplement the SOC investigation and mitigation strategy Stays up to date on the latest Threat Actor Tactics, Techniques and Procedures (TTPs) Conducts perimeter scans of client infrastructure and reports any identified vulnerabilities to the Tiger Team for appropriate escalation Manages client-related tasks within the ConnectWise Manage ticketing system as part of the Client Handling Lifecycle Creates user accounts in SentinelOne console for the client Generates Threat Reports showcasing activity observed within the SentinelOne product Execute passphrase exports as needed for client offboarding Submit legacy installer requests to ensure the team is properly equipped for deployment Provides timely alert notifications to the IR team of any malicious activity impacting our clients Assists with uninstalling/migrating SentinelOne Generates Ranger reports to provide needed visibility into client environments Manages and organizes client assets (multi-site and multi-group accounts) Applies appropriate interoperability exclusions relating to SentinelOne and client applications Performs SentinelOne installation / interoperability troubleshooting as needed Contributes to the overall documentation of SOC processes and procedures Investigates alerts escalated by Analysts (Tier I – Tier II) Escalates alerts to Tier IV as necessary Investigates alerts generated via custom rulesets Attends client calls to provide updates related to alerts seen on a client network, as needed Develops custom SentinelOne interoperability exclusion(s) on client request Contributes to the tuning and recommendation as it relates to the custom rulesets Participates in “Handler on Duty (HOD) shifts” as assigned to support the Tiger Team(s) client matters Develops internal Training/Process Documentation Contributes ideas or helps build innovations to increase SOC efficiencies Performs client external EDR/EPP threat hunts (Carbon Black, CrowdStrike, etc.) May perform other duties as assigned by management Skills And Knowledge Advanced understanding of Windows and Unix operating systems Thorough knowledge of EDR capabilities and investigations Advanced understanding of Digital Forensics and Incident Response practices Comprehensive analysis techniques for reviewing large datasets in various formats Strong analytical and problem-solving skills Demonstrated experience in threat intelligence and research Demonstrated experience in malware analysis and reverse engineering Expertise in PowerShell and Python scripting languages Thorough understanding of TCP/IP and OSI Model concepts Thorough understanding of the Incident Response Life Cycle stages (Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned) Thorough understanding of the MITRE ATT&CK framework Proven ability to work independently and solve complex problems with little direction from management. Highly detail-oriented and committed to producing quality work Job Requirements Bachelor's Degree and 6+ years of IT security related experience or Master's or Advanced Degree and 5+ years related experience Expert experience with Endpoint Detection and Response (EDR) toolsets Advanced experience working on a SOC/CIRT team Ability to communicate in both technical and non-technical terms both oral and written 2+ Information Security Certifications (GIAC, Offensive Security, EC-Council, ISC2) preferred DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. PHYSICAL DEMANDS No physical exertion required Travel within or outside of the state Light work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force as frequently as needed to move objects TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. FLSA OVERTIME CATEGORY Job is exempt from the overtime provisions of the Fair Labor Standards Act. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Show more Show less
Roles & Responsibilities Reviews alerts generated by SentinelOne and implements appropriate containment and mitigation measures Proficient in SIEM, with a focus on QRadar SIEM, as well as threat monitoring and hunting within SIEM environments. Analyzes payloads using JoeSandbox and escalates to the appropriate team as necessary Collaborates with the Forensics team to conduct threat hunting using identified Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) Assists the Tiger Team in targeted collections of systems based on identified malicious activities in the client's environment Conducts historical log reviews to support threat hunting efforts and ensures all malicious artifacts are mitigated in the SentinelOne console Examines client-provided documents and files to supplement the SOC investigation and mitigation strategy Conducts perimeter scans of client infrastructure and reports any identified vulnerabilities to the Tiger Team for appropriate escalation Manages client-related tasks within the ConnectWise Manage ticketing system as part of the Client Handling Lifecycle Creates user accounts in SentinelOne console for the client Generates Threat Reports showcasing activity observed within the SentinelOne product Executes passphrase exports as needed for client offboarding Submits legacy installer requests to ensure the team is properly equipped for deployment Provides timely alert notifications to the IR team of any malicious activity impacting our clients Assists with uninstalling/migrating SentinelOne Generates Ranger reports to provide needed visibility into client environments Manages and organizes client assets (multi-site and multi-group accounts) Applies appropriate interoperability exclusions relating to SentinelOne and client applications Performs SentinelOne installation / interoperability troubleshooting as needed Contributes to the overall documentation of SOC processes and procedures Participates in “Handler on Duty (HOD) shifts as assigned to support the TT client matters Internally escalates support ticket / alerts to Tier II-IV Analysts as needed May perform other duties as assigned by management Skills And Knowledge Demonstrated knowledge of Windows and Unix operating systems Thorough understanding of Digital Forensics and Incident Response practices Proficiency in advanced analysis techniques for processing and reviewing large datasets in various formats Familiarity with TCP/IP and OSI Model concepts at a basic level Expertise in the Incident Response Life Cycle stages (Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned) Working knowledge of the MITRE ATT&CK framework at an intermediate level Proven ability to work independently and solve complex problems with little direction from management Highly detail-oriented and committed to producing quality work Job Requirements Associate’s degree and 6+ years of IT related experience or Bachelor’s Degree and 2-5 years related experience Current or previous knowledge of, or previous experience with, Endpoint Detection and Response (EDR) toolsets General knowledge of the Incident Handling Lifecycle Ability to communicate in both technical and non-technical terms both oral and written DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. PHYSICAL DEMANDS No physical exertion required Travel within or outside of the state Light work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force as frequently as needed to move objects TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. FLSA OVERTIME CATEGORY Job is exempt from the overtime provisions of the Fair Labor Standards Act. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Show more Show less
ROLES & RESPONSIBILITIES Reviews alerts generated by SentinelOne and implement appropriate containment and mitigation measures Analyzes payloads using JoeSandbox and escalate to the appropriate team as necessary Collaborates with the Forensics team to conduct threat hunting using identified Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) Assists the Tiger Team in targeted collections of systems based on identified malicious activities in the client's environment Conducts historical log reviews to support threat hunting efforts and ensure all malicious artifacts are mitigated in the SentinelOne console Examines client-provided documents and files to supplement the SOC investigation and mitigation strategy Conducts perimeter scans of client infrastructure and report any identified vulnerabilities to the Tiger Team for appropriate escalation Manages client-related tasks within the ConnectWise Manage ticketing system as part of the Client Handling Lifecycle Creates user accounts in SentinelOne console for the client Generates Threat Reports showcasing activity observed within the SentinelOne product Executes passphrase exports as needed for client offboarding Submits legacy installer requests to ensure the team is properly equipped for deployment Provides timely alert notifications to the IR team of any malicious activity impacting our clients Serves as an escalation point for Tier 1 analysts Assists with uninstalling/migrating SentinelOne Generates Ranger reports to provide needed visibility into client environments Manages and organizes client assets (multi-site and multi-group accounts) Applies appropriate interoperability exclusions relating to SentinelOne and client applications Performs SentinelOne installation / interoperability troubleshooting as needed Contributes to the overall documentation of SOC processes and procedures Participates in “Handler on Duty (HOD)” shifts as assigned to support the Tiger Team(s) client matters Internally escalates support ticket / alerts to Tier III-IV Analysts as needed May perform other duties as assigned by management SKILLS AND KNOWLEDGE Demonstrated knowledge of Windows and Unix operating systems Thorough understanding of Digital Forensics and Incident Response practices Proficiency in advanced analysis techniques for processing and reviewing large datasets in various formats Familiarity with TCP/IP and OSI Model concepts at a basic level Expertise in the Incident Response Life Cycle stages (Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned) Working knowledge of the MITRE ATT&CK framework at an intermediate level Proven ability to work independently and solve complex problems without constant direction from management Highly detail-oriented and committed to producing quality work JOB REQUIREMENTS Bachelor's Degree and 4+ years of IT security related experience or Master's or Advanced Degree and 3+ years related experience Current or previous experience with Endpoint Detection and Response (EDR) toolsets Previous experience working on a SOC/CIRT team Ability to communicate in both technical and non-technical terms both oral and written 1-2 Information Security Certifications (GIAC, Offensive Security, EC-Council, ISC2) preferred DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. PHYSICAL DEMANDS No physical exertion required Travel within or outside of the state Light work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force as frequently as needed to move objects TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. FLSA OVERTIME CATEGORY Job is exempt from the overtime provisions of the Fair Labor Standards Act. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. About Us Arete Incident Response is an elite team of the world’s leading cybersecurity and digital forensics experts who combat today’s sophisticated cyberattacks. We work tirelessly to provide unparalleled capabilities and solutions throughout the entire cyber incident life cycle. These include incident response readiness assessments and penetration tests as well as post-incident response, remediation, containment, and eradication services. We work in close collaboration with industry leaders and government agencies along with leading cybersecurity technology platforms to deliver an innovative, intelligence-based approach to solving our client’s toughest challenges. If you want to work with the most talented and experienced people in the industry with the desire to be a cyber hunter and industry expert, we want you to be a part of our team.
SUMMARY The People Operations Senior Associate supports the smooth execution of Human Resources (HR) operations for Arete’s Center of Excellence (CoE) in the APAC region. The role focuses on delivering efficient and timely administrative support across core HR processes, including employee lifecycle activities, data management, documentation, and process compliance. The People Operations Senior Associate collaborates with HR team members to execute daily operations and contribute to special projects that enhance employee experience and process effectiveness. The position requires a working knowledge of HR practices and a commitment to operational excellence, enabling consistent support for employees and organizational goals. ROLES & RESPONSIBILITIES Collaborates with the recruitment team to share candidate updates and ensure smooth coordination throughout the hiring process Supports recruitment efforts by managing candidate communication and scheduling interviews to deliver a seamless candidate experience Manages the issuance of employment contracts and ensures accurate documentation and secure recordkeeping Provides pre-offer and post-offer support through the Arete Connects program to enhance candidate engagement Facilitates quick start onboarding presentations for new hires to support a smooth transition into the organization Coordinates with payroll, benefits, and other HR functions to ensure cohesive communication and integration of employee data Schedules post-offer engagement touchpoints to maintain consistent communication with candidates during the onboarding phase Conducts reference and background checks and maintains accurate records in the Human Resources Information System (HRIS) Routes HR-related inquiries to appropriate team members to provide timely responses and support Publishes periodic HR reports to provide data insights that inform people strategies and decision-making Schedules and supports HR events and meetings to ensure effective planning and stakeholder participation Contributes to ad-hoc HR projects such as employee feedback surveys to improve the overall employee experience Maintains and updates employee records and data changes in the Workday to ensure accuracy and compliance Tracks onboarding completion, probation timelines, and documentation milestones to ensure timely HR interventions and compliance Responds to employee queries related to policies, documentation, or onboarding processes to provide first-level HR support Supports documentation audits by preparing relevant files and ensuring policy-aligned filing practices Collaborates with People Partners and HR Business Partners to prepare reports or documentation required for employee lifecycle events (e.g., transfers, exits) Monitors service request queues or tickets to ensure timely closure and SLA adherence for HR operational tasks Maintains HR process documentation and identifies minor gaps or updates to enhance standard operating procedures (SOPs) Coordinates logistics and communications for HR engagement programs and new hire orientation session May perform other duties as assigned by management SKILLS AND KNOWLEDGE Understanding of human resources processes and industry-standard best practices Proficiency in Microsoft Office applications, including Word, Excel, and Outlook Demonstrated ability to maintain high standards of professionalism, quality, and process efficiency Effective written and verbal communication skills to engage with internal and external stakeholders Ability to independently manage tasks and proactively contribute to process improvements Ability to manage sensitive employee data with confidentiality and integrity Strong organizational and time management skills to prioritize and execute tasks effectively Experience in an onboarding specialist role Ability to provide responsive and employee-centric service during onboarding and HR support interactions Proficiency in English (spoken and written) JOB REQUIREMENTS Bachelor’s degree and 0 – 2 years related experience DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodations may be made to enable people with disabilities to perform the essential functions of this job. TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. Any employee making changes unauthorized by the Human Resources Department will be subject to disciplinary action up to and including termination. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. About Us Arete Incident Response is an elite team of the world’s leading cybersecurity and digital forensics experts who combat today’s sophisticated cyberattacks. We work tirelessly to provide unparalleled capabilities and solutions throughout the entire cyber incident life cycle. These include incident response readiness assessments and penetration tests as well as post-incident response, remediation, containment, and eradication services. We work in close collaboration with industry leaders and government agencies along with leading cybersecurity technology platforms to deliver an innovative, intelligence-based approach to solving our client’s toughest challenges. If you want to work with the most talented and experienced people in the industry with the desire to be a cyber hunter and industry expert, we want you to be a part of our team.
SUMMARY The Workday Technical Consultant supports Arete’s efforts to automate and optimize Human Resources (HR) business processes through the effective use of system-based solutions. This role manages the administration, configuration, and ongoing maintenance of the Workday Human Capital Management (HCM) system, with a focus on Core HCM, benefits, recruiting, talent and performance management, reporting, security and integrations. The consultant is responsible for recommending system improvements aligned with evolving HR needs, configuring security settings, coordinating user acceptance testing and managing deployments from sandbox to production. The Workday Technical Consultant partners with HR, Information Technology (IT) and other departments to translate business needs into automated Workday workflows and enhance platform performance in support of organizational objectives. ROLES & RESPONSIBILITIES Workday HCM System Management & Optimization: Manages configuration, testing, and deployment of Workday modules including Core HCM, security, reporting, and integrations to ensure alignment with business and HR goals Serves as the subject matter expert for Workday Core HCM, security, reporting, and integrations to provide guidance and support to HR and Information Technology (IT) teams Continuously evaluates and enhances system functionality to identify opportunities for automation and process improvement Collaborates with IT teams to optimize integrations with internal and external systems to ensure data integrity and security Translates HR requirements into formal design documents with specific solutions and clear deadlines to ensure structured implementation Maintains knowledge of system architecture and participates in technical discussions to support effective problem-solving and design decisions Recommends and manages updates to Workday tenant setup to reflect evolving business needs Creates new business processes and notifications in sandbox and deployment tenants based on approved design workflows Security & Compliance: Recommends and develops user-based, domain, and business process security groups to ensure data confidentiality and compliance Configures and manages Workday security roles, permissions, and domain security policies to ensure access control Conducts security audits, access reviews, and compliance checks to uphold data integrity and regulatory standards (HIPAA, GDPR, etc.) Troubleshoots security-related issues and implements improvements to strengthen data protection and compliance Reporting & Analytics: Designs and builds complex custom reports and dashboard reports across modules support business needs and provide strategic insights Develops reports and dashboards using calculated fields and composite logic to deliver actionable business and HR analytics Utilizes Business Intelligence tools to generate and automate reporting that informs HR strategy and decision-making Sets up dashboards and worklets to improve data visibility and user experience Benefits & Absence Management: Configures and maintains Workday Benefits and Absence modules to ensure accurate administration of employee benefits and policies and compliance with regulations Collaborates with the Benefits team to manage annual enrollment processes including system setup, testing, and issue resolution Recruiting: Manages and configures Workday Recruiting modules to streamline workflows and improve talent acquisition outcomes Serves as the subject matter expert for talent acquisition technology including applicant tracking systems (ATS), candidate relationship management (CRM) tools, and integrations Talent and Performance Management: Configures and optimizes Workday Talent and Performance Management functionalities including reviews, goals, feedback, career profiles, and mentorship programs to enhance employee development Collaborates with HR to ensure effective use of Workday tools for performance management and talent development initiatives Manages calibration processes to ensure equitable and consistent performance evaluations Payroll, Compensation & Learning: Leads process implementation and support of Workday modules including payroll, compensation, and learning to improve operational efficiency and compliance Integrations Management: Designs, configures, and manages integrations between Workday and third-party systems including HR, payroll, and finance to ensure secure and seamless data exchange Develops integrations using Enterprise Interface Builder (EIB), Core Connectors, and Workday Studio to automate and streamline processes Creates test cases for payroll and non-payroll integrations covering staffing events and data changes to ensure system accuracy Monitors data feeds and resolves integration issues to maintain data quality and reliability Maintains integration documentation, data mapping, and audit trails to support transparency and troubleshooting Stakeholder Engagement & Training: Provides training, documentation, and system support to HR, IT, and business users to drive adoption and effective use of Workday modules Engages with HR colleagues to validate custom automations and integration solutions to meet specific functional needs Works closely with cross-functional teams to gather feedback, define system enhancements, and lead Workday-related initiatives Project Management & Workday Innovation: Leads Human Resources Information System (HRIS) projects from planning through execution to ensure on-time delivery and user acceptance Stays informed of new Workday features and updates to assess applicability and recommend enhancements May perform other duties as assigned by management SKILLS AND KNOWLEDGE Ability to manage multiple tasks and projects under pressure in fast-paced environments Knowledge of both functional and technical aspects of the Workday platform Ability to perform detailed work with a high level of accuracy and a strong focus on data integrity and system security Ability to troubleshoot and resolve technical issues within Workday, including complex system and integration problems Familiarity with integration tools such as Workday Studio, Enterprise Interface Builder (EIB), and Workday Web Services (WWS) Experience with integration technologies including REST and SOAP APIs, XML, XSLT, and JSON Understanding of security and data privacy standards such as Sarbanes-Oxley (SOX), General Data Protection Regulation (GDPR), and related frameworks Experience using Workday modules such as Recruiting, Benefits, Absence, Compensation, Time Tracking, Payroll, Talent & Performance, and Integrations Expertise in Workday reporting tools, including advanced, matrix, and composite reports, as well as calculated fields Experience working with Business Intelligence tools for report generation and data analysis Understanding of HR processes, business requirements, and best practices, with the ability to translate them into technical Workday solutions Communication and stakeholder management skills with the ability to collaborate effectively across technical and non-technical teams Openness to learning and expanding on current Human Resources (HR) business processes Commitment to confidentiality and integrity, with the ability to handle sensitive, nonpublic information JOB REQUIREMENTS Bachelor’s degree in Human Resources, Information Systems, Business Administration, or a related field 6–8 years of relevant professional experience in Human Resources Information Systems (HRIS) or related domains Minimum 5 years of hands-on experience with Workday, including Core Human Capital Management (HCM), Security, and Reporting modules Workday certifications required: Workday HCM Core Certification Workday Security Certification DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. About Us Arete Incident Response is an elite team of the world’s leading cybersecurity and digital forensics experts who combat today’s sophisticated cyberattacks. We work tirelessly to provide unparalleled capabilities and solutions throughout the entire cyber incident life cycle. These include incident response readiness assessments and penetration tests as well as post-incident response, remediation, containment, and eradication services. We work in close collaboration with industry leaders and government agencies along with leading cybersecurity technology platforms to deliver an innovative, intelligence-based approach to solving our client’s toughest challenges. If you want to work with the most talented and experienced people in the industry with the desire to be a cyber hunter and industry expert, we want you to be a part of our team.
Summary The Data Analyst role supports the Structured Data Services Team Lead on active projects. This involves understanding client requirements, reviewing documents, and identifying, gathering, analyzing, and extracting relevant data. The Data Analyst reports any difficulties and observed patterns to the Senior Data Analyst II or Team Lead. Meeting deadlines while maintaining high standards of accuracy and quality is crucial for this role. Roles & Responsibilities Analyzes documents and extracts content based on project specifications using Excel and other file types Collaborate closely with the Team Lead to receive the latest updates and instructions on projects and develops relationships within immediate team Performs data cleansing or format extracted data using formulas, manual methods, or programming tools Conducts audits on assigned projects Follows established procedures and methods to solve problems Identifies the correlation, issue and pattern through data mining Provides data into comprehensible structures of organizing and transforming information Identifies the timing and indicators of data access based on the analysis Responsible for integrity in analysis, quality on the projects Manages multiple projects daily Meets project targets consistently May perform other duties as assigned by management Skills And Knowledge Basic understanding of document analysis especially in data breach review Knowledge in the Advanced Excel and basic other Microsoft applications (like Word, PowerPoint etc.) Experience with Macro coding, preferred Knowledge and/or experience with a common scripting or programming language, including Powery Query and Python will be added advantage Strong verbal and written communication skills Experience working in a team environment Flexible, adaptable, responsive, and positive Data Analytical Certifications would be preferred Basic understanding of ETL frameworks Job Requirements Bachelor's Degree in Computer Science, Mathematics, Information Management, or Statistics and 0-1 years of Data Analyst experience or related experience. Ability to work greater than 40 hours per week as needed DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better.
Summary The People Operations Senior Associate supports the smooth execution of Human Resources (HR) operations for Arete’s Center of Excellence (CoE) in the APAC region. The role focuses on delivering efficient and timely administrative support across core HR processes, including employee lifecycle activities, data management, documentation, and process compliance. The People Operations Senior Associate collaborates with HR team members to execute daily operations and contribute to special projects that enhance employee experience and process effectiveness. The position requires a working knowledge of HR practices and a commitment to operational excellence, enabling consistent support for employees and organizational goals. Roles & Responsibilities Collaborates with the recruitment team to share candidate updates and ensure smooth coordination throughout the hiring process Supports recruitment efforts by managing candidate communication and scheduling interviews to deliver a seamless candidate experience Manages the issuance of employment contracts and ensures accurate documentation and secure recordkeeping Provides pre-offer and post-offer support through the Arete Connects program to enhance candidate engagement Facilitates quick start onboarding presentations for new hires to support a smooth transition into the organization Coordinates with payroll, benefits, and other HR functions to ensure cohesive communication and integration of employee data Schedules post-offer engagement touchpoints to maintain consistent communication with candidates during the onboarding phase Conducts reference and background checks and maintains accurate records in the Human Resources Information System (HRIS) Routes HR-related inquiries to appropriate team members to provide timely responses and support Publishes periodic HR reports to provide data insights that inform people strategies and decision-making Schedules and supports HR events and meetings to ensure effective planning and stakeholder participation Contributes to ad-hoc HR projects such as employee feedback surveys to improve the overall employee experience Maintains and updates employee records and data changes in the Workday to ensure accuracy and compliance Tracks onboarding completion, probation timelines, and documentation milestones to ensure timely HR interventions and compliance Responds to employee queries related to policies, documentation, or onboarding processes to provide first-level HR support Supports documentation audits by preparing relevant files and ensuring policy-aligned filing practices Collaborates with People Partners and HR Business Partners to prepare reports or documentation required for employee lifecycle events (e.g., transfers, exits) Monitors service request queues or tickets to ensure timely closure and SLA adherence for HR operational tasks Maintains HR process documentation and identifies minor gaps or updates to enhance standard operating procedures (SOPs) Coordinates logistics and communications for HR engagement programs and new hire orientation session May perform other duties as assigned by management Skills And Knowledge Understanding of human resources processes and industry-standard best practices Proficiency in Microsoft Office applications, including Word, Excel, and Outlook Demonstrated ability to maintain high standards of professionalism, quality, and process efficiency Effective written and verbal communication skills to engage with internal and external stakeholders Ability to independently manage tasks and proactively contribute to process improvements Ability to manage sensitive employee data with confidentiality and integrity Strong organizational and time management skills to prioritize and execute tasks effectively Experience in an onboarding specialist role Ability to provide responsive and employee-centric service during onboarding and HR support interactions Proficiency in English (spoken and written) Job Requirements Bachelor’s degree and 0 – 2 years related experience DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodations may be made to enable people with disabilities to perform the essential functions of this job. TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. Any employee making changes unauthorized by the Human Resources Department will be subject to disciplinary action up to and including termination. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better.
Summary The Workday Technical Consultant supports Arete’s efforts to automate and optimize Human Resources (HR) business processes through the effective use of system-based solutions. This role manages the administration, configuration, and ongoing maintenance of the Workday Human Capital Management (HCM) system, with a focus on Core HCM, benefits, recruiting, talent and performance management, reporting, security and integrations. The consultant is responsible for recommending system improvements aligned with evolving HR needs, configuring security settings, coordinating user acceptance testing and managing deployments from sandbox to production. The Workday Technical Consultant partners with HR, Information Technology (IT) and other departments to translate business needs into automated Workday workflows and enhance platform performance in support of organizational objectives. Roles & Responsibilities Workday HCM System Management & Optimization: Manages configuration, testing, and deployment of Workday modules including Core HCM, security, reporting, and integrations to ensure alignment with business and HR goals Serves as the subject matter expert for Workday Core HCM, security, reporting, and integrations to provide guidance and support to HR and Information Technology (IT) teams Continuously evaluates and enhances system functionality to identify opportunities for automation and process improvement Collaborates with IT teams to optimize integrations with internal and external systems to ensure data integrity and security Translates HR requirements into formal design documents with specific solutions and clear deadlines to ensure structured implementation Maintains knowledge of system architecture and participates in technical discussions to support effective problem-solving and design decisions Recommends and manages updates to Workday tenant setup to reflect evolving business needs Creates new business processes and notifications in sandbox and deployment tenants based on approved design workflows Security & Compliance: Recommends and develops user-based, domain, and business process security groups to ensure data confidentiality and compliance Configures and manages Workday security roles, permissions, and domain security policies to ensure access control Conducts security audits, access reviews, and compliance checks to uphold data integrity and regulatory standards (HIPAA, GDPR, etc.) Troubleshoots security-related issues and implements improvements to strengthen data protection and compliance Reporting & Analytics: Designs and builds complex custom reports and dashboard reports across modules support business needs and provide strategic insights Develops reports and dashboards using calculated fields and composite logic to deliver actionable business and HR analytics Utilizes Business Intelligence tools to generate and automate reporting that informs HR strategy and decision-making Sets up dashboards and worklets to improve data visibility and user experience Benefits & Absence Management: Configures and maintains Workday Benefits and Absence modules to ensure accurate administration of employee benefits and policies and compliance with regulations Collaborates with the Benefits team to manage annual enrollment processes including system setup, testing, and issue resolution Recruiting: Manages and configures Workday Recruiting modules to streamline workflows and improve talent acquisition outcomes Serves as the subject matter expert for talent acquisition technology including applicant tracking systems (ATS), candidate relationship management (CRM) tools, and integrations Talent and Performance Management: Configures and optimizes Workday Talent and Performance Management functionalities including reviews, goals, feedback, career profiles, and mentorship programs to enhance employee development Collaborates with HR to ensure effective use of Workday tools for performance management and talent development initiatives Manages calibration processes to ensure equitable and consistent performance evaluations Payroll, Compensation & Learning: Leads process implementation and support of Workday modules including payroll, compensation, and learning to improve operational efficiency and compliance Integrations Management: Designs, configures, and manages integrations between Workday and third-party systems including HR, payroll, and finance to ensure secure and seamless data exchange Develops integrations using Enterprise Interface Builder (EIB), Core Connectors, and Workday Studio to automate and streamline processes Creates test cases for payroll and non-payroll integrations covering staffing events and data changes to ensure system accuracy Monitors data feeds and resolves integration issues to maintain data quality and reliability Maintains integration documentation, data mapping, and audit trails to support transparency and troubleshooting Stakeholder Engagement & Training: Provides training, documentation, and system support to HR, IT, and business users to drive adoption and effective use of Workday modules Engages with HR colleagues to validate custom automations and integration solutions to meet specific functional needs Works closely with cross-functional teams to gather feedback, define system enhancements, and lead Workday-related initiatives Project Management & Workday Innovation: Leads Human Resources Information System (HRIS) projects from planning through execution to ensure on-time delivery and user acceptance Stays informed of new Workday features and updates to assess applicability and recommend enhancements May perform other duties as assigned by management Skills And Knowledge Ability to manage multiple tasks and projects under pressure in fast-paced environments Knowledge of both functional and technical aspects of the Workday platform Ability to perform detailed work with a high level of accuracy and a strong focus on data integrity and system security Ability to troubleshoot and resolve technical issues within Workday, including complex system and integration problems Familiarity with integration tools such as Workday Studio, Enterprise Interface Builder (EIB), and Workday Web Services (WWS) Experience with integration technologies including REST and SOAP APIs, XML, XSLT, and JSON Understanding of security and data privacy standards such as Sarbanes-Oxley (SOX), General Data Protection Regulation (GDPR), and related frameworks Experience using Workday modules such as Recruiting, Benefits, Absence, Compensation, Time Tracking, Payroll, Talent & Performance, and Integrations Expertise in Workday reporting tools, including advanced, matrix, and composite reports, as well as calculated fields Experience working with Business Intelligence tools for report generation and data analysis Understanding of HR processes, business requirements, and best practices, with the ability to translate them into technical Workday solutions Communication and stakeholder management skills with the ability to collaborate effectively across technical and non-technical teams Openness to learning and expanding on current Human Resources (HR) business processes Commitment to confidentiality and integrity, with the ability to handle sensitive, nonpublic information Job Requirements Bachelor’s degree in Human Resources, Information Systems, Business Administration, or a related field 6–8 years of relevant professional experience in Human Resources Information Systems (HRIS) or related domains Minimum 5 years of hands-on experience with Workday, including Core Human Capital Management (HCM), Security, and Reporting modules Workday certifications required: Workday HCM Core Certification Workday Security Certification DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better.
SUMMARY The Data Analyst role supports the Structured Data Services Team Lead on active projects. This involves understanding client requirements, reviewing documents, and identifying, gathering, analyzing, and extracting relevant data. The Data Analyst reports any difficulties and observed patterns to the Senior Data Analyst II or Team Lead. Meeting deadlines while maintaining high standards of accuracy and quality is crucial for this role. ROLES & RESPONSIBILITIES Analyzes documents and extracts content based on project specifications using Excel and other file types Collaborate closely with the Team Lead to receive the latest updates and instructions on projects and develops relationships within immediate team Performs data cleansing or format extracted data using formulas, manual methods, or programming tools Conducts audits on assigned projects Follows established procedures and methods to solve problems Identifies the correlation, issue and pattern through data mining Provides data into comprehensible structures of organizing and transforming information Identifies the timing and indicators of data access based on the analysis Responsible for integrity in analysis, quality on the projects Manages multiple projects daily Meets project targets consistently May perform other duties as assigned by management SKILLS AND KNOWLEDGE Basic understanding of document analysis especially in data breach review Knowledge in the Advanced Excel and basic other Microsoft applications (like Word, PowerPoint etc.) Experience with Macro coding, preferred Knowledge and/or experience with a common scripting or programming language, including Powery Query and Python will be added advantage Strong verbal and written communication skills Experience working in a team environment Flexible, adaptable, responsive, and positive Data Analytical Certifications would be preferred Basic understanding of ETL frameworks JOB REQUIREMENTS Bachelor's Degree in Computer Science, Mathematics, Information Management, or Statistics and 0-1 years of Data Analyst experience or related experience. Ability to work greater than 40 hours per week as needed DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. About Us Arete Incident Response is an elite team of the world’s leading cybersecurity and digital forensics experts who combat today’s sophisticated cyberattacks. We work tirelessly to provide unparalleled capabilities and solutions throughout the entire cyber incident life cycle. These include incident response readiness assessments and penetration tests as well as post-incident response, remediation, containment, and eradication services. We work in close collaboration with industry leaders and government agencies along with leading cybersecurity technology platforms to deliver an innovative, intelligence-based approach to solving our client’s toughest challenges. If you want to work with the most talented and experienced people in the industry with the desire to be a cyber hunter and industry expert, we want you to be a part of our team.
Summary The Security Engineer GSOC is responsible for all aspects of onboarding and troubleshooting for SentinelOne and AlienVault for all MDR engagements. The Security Engineer GSOC provides onboarding support, SentinelOne agent installation, troubleshooting the issues if any, sensor deployments in AlienVault and deployment of other components in SIEM solutions, log source onboarding in SIEM, and related activities for all active engagements. The Security Engineer GSOC supports overall implementation by providing necessary support for current matters. The Security Engineer GSOC role takes direction on what is needed regarding all aspects of SentinelOne and AlienVault for the engagements. The Security Engineer GSOC works with the MDR team to support SentinelOne installations, interoperability issues, exclusions, whitelisting, and overall troubleshooting. The Security Engineer GSOC ensures that SentinelOne is deployed to a client’s environment they are fully protected by it and clients opting for SIEM solutions are aptly covered from security standpoint. Roles & Responsibilities Communicates with the client to initiate the onboarding. Prepares and shares the network prerequisites and SentinelOne packages Ensures all required details are in place before an activity is started Handles all SentinelOne-related inquiries and tasks for their assigned projects Documents SOP and procedures related to common client inquiries related to SentinelOne deployment, support, and troubleshooting Provides resolution for onboarding/performance-related issues to MDR team or engages directly with the client with guidance Provides daily reports on SentinelOne deployment status Provides technical training and acclimation for clients to familiarize themselves with the S1 interface and functionalities Drives all AlienVault deployments with customers Understands the architecture, deploys the sensors, and prepares the log baseline for assets in scope for log collection Ensures ingested logs are parsed properly and alarms are getting triggered as expected Develops custom parsers for applications to onboard them to SIEM solutions May perform other duties as assigned by management Skills And Knowledge Working understanding of API queries Working understanding of scripting Working understanding of developing PowerShell scripts and writing batch files for ad hoc requirements General understanding of Windows and Unix Intervals Working understanding of information security. Thorough understanding of analysis techniques for reviewing large datasets Working understanding of TCP/IP and OSI Model Thorough understanding of the Incident Response Life Cycle (Preparation, Identification, Containment, Eradication, Recovery, Lesson Learned) Working understanding of the MITRE ATT&CK framework Ability to communicate in both technical and non-technical terms both oral and written General understanding of: Network Security Monitoring (NSM), network traffic analysis, and log analysis Penetration Testing / Vulnerability Scanning Thorough understanding of enterprise security controls in Active Directory / Windows environments Experience with hands-on penetration testing against Windows, Unix, or web application targets Job Requirements Associate's degree and 6-8 years of IT security-related experience or Bachelor's degree and 2-5 years related experience Current or previous experience with Endpoint Detection and Response (EDR) toolsets SOC/CIRT team experience Applied knowledge in at least one scripting or development language (such as Python), preferred DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. PHYSICAL DEMANDS No physical exertion required Travel within or outside of the state Light work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force as frequently as needed to move objects TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. FLSA OVERTIME CATEGORY Job is exempt from the overtime provisions of the Fair Labor Standards Act. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better.
SUMMARY The Security Threat Analyst II supports the Arete Security Operation Center (SOC) in all monitoring, detection, and response efforts for the Digital Forensics and Incident Response (DFIR) organization. The Security Threat Analyst II assists the Tiger Teams in the identification of pre/post-breach malicious artifacts, threat hunts for additional malicious artifacts, escalates findings, and ensures collaboration with the Forensic team for targeted collections and root-cause analysis. ROLES & RESPONSIBILITIES Reviews alerts generated by SentinelOne and implement appropriate containment and mitigation measures Analyses payloads using JoeSandbox and escalate to the appropriate team as necessary Collaborates with the Forensics team to conduct threat hunting using identified Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) Assists the Tiger Team in targeted collections of systems based on identified malicious activities in the client's environment Conducts historical log reviews to support threat hunting efforts and ensure all malicious artifacts are mitigated in the SentinelOne console Examines client-provided documents and files to supplement the SOC investigation and mitigation strategy Conducts perimeter scans of client infrastructure and report any identified vulnerabilities to the Tiger Team for appropriate escalation Manages client-related tasks within the ConnectWise Manage ticketing system as part of the Client Handling Lifecycle Creates user accounts in SentinelOne console for the client Generates Threat Reports showcasing activity observed within the SentinelOne product Executes passphrase exports as needed for client offboarding Submits legacy installer requests to ensure the team is properly equipped for deployment Provides timely alert notifications to the IR team of any malicious activity impacting our clients Serves as an escalation point for Tier 1 analysts Assists with uninstalling/migrating SentinelOne Generates Ranger reports to provide needed visibility into client environments Manages and organizes client assets (multi-site and multi-group accounts) Applies appropriate interoperability exclusions relating to SentinelOne and client applications Performs SentinelOne installation / interoperability troubleshooting as needed Contributes to the overall documentation of SOC processes and procedures Participates in “Handler on Duty (HOD)” shifts as assigned to support the Tiger Team(s) client matters Internally escalates support ticket / alerts to Tier III-IV Analysts as needed May perform other duties as assigned by management SKILLS AND KNOWLEDGE Demonstrated knowledge of Windows and Unix operating systems Thorough understanding of Digital Forensics and Incident Response practices Proficiency in advanced analysis techniques for processing and reviewing large datasets in various formats Familiarity with TCP/IP and OSI Model concepts at a basic level Expertise in the Incident Response Life Cycle stages (Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned) Working knowledge of the MITRE ATT&CK framework at an intermediate level Proven ability to work independently and solve complex problems without constant direction from management Highly detail-oriented and committed to producing quality work JOB REQUIREMENTS Bachelor's Degree and 4+ years of IT security related experience or Master's or Advanced Degree and 3+ years related experience Current or previous experience with Endpoint Detection and Response (EDR) toolsets Previous experience working on a SOC/CIRT team Ability to communicate in both technical and non-technical terms both oral and written 1-2 Information Security Certifications (GIAC, Offensive Security, EC-Council, ISC2) preferred DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better.
JOB TITLE: Associate Director, Forensics Summary The Associate Director of Forensics manages and oversees all aspects of the Digital Forensics Incident Response (DFIR) engagements for multiple Tiger Teams, including the Tiger Team’s performance, execution, delivery, quality control, and client development. Operating as an industry leader in Digital Forensics Incident Response, and a trusted advisor to the client and breach coach, the Forensic Associate Director helps to ensure 100% client success. The Associate Director, Forensics will provide breach coaches and Insurance Carriers with tailored detailed analysis through a narrative and story with reports summarizing how the unauthorized actor obtained access and identifying the potential root cause of the cyber intrusion. Roles & Responsibilities: Provides forensic data and artifact collection requests needed for the forensic analysis and ensures the data is collected, delivered, and processed following the project timelines and deliverables Responsible for shadowing on scoping calls they are assigned to by the teams IR Ops Associated Responsible for listening to the scoping call to have situational awareness and case background from the start of every engagement, so they can drive the forensic investigation forward ensuring the right data is collected and analysis questions answered Supporting the Director, as a Forensic SME for all active forensic analysis for projects on their assigned Tiger Teams Responsible for maintaining target utilization for the assigned Tiger Teams from client billable work including forensic analysis, participating in client update or forensic scoping and update findings calls, client correspondence related to forensic analysis, data collection, or investigative questions verbally or in writing Manages and oversees the forensic data collection process in support of the forensic investigation for the assigned engagement Ensures the forensic project timeline is on track, daily updates are provided from the assigned Tiger Teams, and Analyst SLAs are met (i.e. report is delivered on time, interim and final updates are provided on time when asked) Ensures the Tiger Teams and assigned analysts have the data, context, and clarity they need to conduct accurate and timely analysis Participate in client-facing calls when needed to support Tiger Teams and provide forensic updates as needed to ensure accurate findings are conveyed as they relate to the investigation Communicating both verbally and in writing to answer client and counsel questions related to the forensic investigation Oversee the delivery of the Tiger Teams and forensics pool while providing technical reviews and quality control for updates and reports Support the Tiger Team with delegating and managing the Tiger Team including the Senior Analysts and Analysts on their respective Tiger Team Conducts the performance reviews of all forensic analysts on their respective Tiger Teams Maintain a minimum caseload of at least three cases for which they will lead and deliver forensic analysis updates with the Tiger Team. The caseload will be maintained alongside the Forensic Associate Director’s other responsibilities and duties Conducts final review of the report from the perspective of the forensic investigator ensuring all possible investigative questions were addressed in the analysis and requesting additional context or analysis when the report requires more work May perform other duties as assigned by management ROLE ACCOUNTABILITIES: Squad Management Manage cadence and team delivery through routine team meetings Review and assess team performance through the measurement of KPIs Develop consistency between pods through the execution of playbooks and consistent training for new hires Project Leadership Ensure projects stay within scope, schedule, and budget Manage project communications, negotiations, and solutions Address client feedback as directed by Sr. Leadership Performance Management Hold individuals accountable for following the playbooks Inspire individuals to achieve results measured by defined metrics Be open to new ideas and ensure best practices are implemented Process Oversight Ensure adherence to business processes to ensure operational efficiency and help identify infrastructure requirements to meet the business needs Track lessons learned from previous projects and ensure playbooks and training materials are reviewed & updated regularly Team Utilization Manage project assignments and hand off processes Ensure the team follows and upholds standardized process Quality Assurance / Client Satisfaction Ensure client satisfaction among internal and external stakeholders Responsible for creating and updating metrics indicating client satisfaction among internal and external stakeholders Project Execution / Delegation Provide oversight of client satisfaction among internal and external stakeholders Monitor and report metrics indicating client satisfaction among internal and external stakeholders Support the development of strategic partnerships to maintain profitable and long-lasting relationships with key clients Job Requirements Must have 10+ years of incident response or digital forensics experience with a passion for cyber security (consulting experience preferred) Proficient with host-based forensics, network forensics, malware analysis and data breach response Experienced with EnCase, Axiom, X-Ways, FTK, SIFT, ELK, Redline, Volatility, and open-source forensic tools Experience with a common scripting or programming language, including Perl, Python, Bash, or PowerShell Experience managing and mentoring forensic teams, preferably in a security, incident response or professional services consulting firm A deep understanding of working with legal counsel and the ability to thrive in a fast-paced environment, experience working with and communicating with C-level executives, attorneys, and insurance carriers Disclaimer The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. Work Environment While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodations may be made to enable people with disabilities to perform the essential functions of this job. Physical Demands No physical exertion required. Travel within or outside of state. Light work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force as frequently as needed to move objects. Terms of Employment Salary and benefits shall be paid consistent with Arete salary and benefit policy. FLSA Overtime Category Job is exempt from the overtime provisions of the Fair Labor Standards Act. Declaration The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. #LI-ONSITE #LI-HYBRID Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. About Us Arete Incident Response is an elite team of the world’s leading cybersecurity and digital forensics experts who combat today’s sophisticated cyberattacks. We work tirelessly to provide unparalleled capabilities and solutions throughout the entire cyber incident life cycle. These include incident response readiness assessments and penetration tests as well as post-incident response, remediation, containment, and eradication services. We work in close collaboration with industry leaders and government agencies along with leading cybersecurity technology platforms to deliver an innovative, intelligence-based approach to solving our client’s toughest challenges. If you want to work with the most talented and experienced people in the industry with the desire to be a cyber hunter and industry expert, we want you to be a part of our team.
Summary The Associate Director of Forensics manages and oversees all aspects of the Digital Forensics Incident Response (DFIR) engagements for multiple Tiger Teams, including the Tiger Team’s performance, execution, delivery, quality control, and client development. Operating as an industry leader in Digital Forensics Incident Response and a trusted advisor to the client and breach coach, the Forensic Associate Director helps to ensure 100% client success. The Associate Director, Forensics will provide breach coaches and Insurance Carriers with tailored detailed analysis through a narrative and story with reports summarizing how the unauthorized actor obtained access and identifying the potential root cause of the cyber intrusion. Roles & Responsibilities: Provides forensic data and artifact collection requests needed for the forensic analysis and ensures the data is collected, delivered, and processed following the project timelines and deliverables Responsible for shadowing on scoping calls they are assigned to by the teams IR Ops Associated Responsible for listening to the scoping call to have situational awareness and case background from the start of every engagement, so they can drive the forensic investigation forward ensuring the right data is collected and analysis questions answered Supporting the Director, as a Forensic SME for all active forensic analysis for projects on their assigned Tiger Teams Responsible for maintaining target utilization for the assigned Tiger Teams from client billable work including forensic analysis, participating in client update or forensic scoping and update findings calls, client correspondence related to forensic analysis, data collection, or investigative questions verbally or in writing Manages and oversees the forensic data collection process in support of the forensic investigation for the assigned engagement Ensures the forensic project timeline is on track, daily updates are provided from the assigned Tiger Teams, and Analyst SLAs are met (i.e. report is delivered on time, interim and final updates are provided on time when asked) Ensures the Tiger Teams and assigned analysts have the data, context, and clarity they need to conduct accurate and timely analysis Participate in client-facing calls when needed to support Tiger Teams and provide forensic updates as needed to ensure accurate findings are conveyed as they relate to the investigation Communicating both verbally and in writing to answer client and counsel questions related to the forensic investigation Oversee the delivery of the Tiger Teams and forensics pool while providing technical reviews and quality control for updates and reports Support the Tiger Team with delegating and managing the Tiger Team including the Senior Analysts and Analysts on their respective Tiger Team Conducts the performance reviews of all forensic analysts on their respective Tiger Teams Maintain a minimum caseload of at least three cases for which they will lead and deliver forensic analysis updates with the Tiger Team. The caseload will be maintained alongside the Forensic Associate Director’s other responsibilities and duties Conducts final review of the report from the perspective of the forensic investigator ensuring all possible investigative questions were addressed in the analysis and requesting additional context or analysis when the report requires more work May perform other duties as assigned by management ROLE ACCOUNTABILITIES: Squad Management Manage cadence and team delivery through routine team meetings Review and assess team performance through the measurement of KPIs Develop consistency between pods through the execution of playbooks and consistent training for new hires Project Leadership Ensure projects stay within scope, schedule, and budget Manage project communications, negotiations, and solutions Address client feedback as directed by Sr. Leadership Performance Management Hold individuals accountable for following the playbooks Inspire individuals to achieve results measured by defined metrics Be open to new ideas and ensure best practices are implemented Process Oversight Ensure adherence to business processes to ensure operational efficiency and help identify infrastructure requirements to meet the business needs Track lessons learned from previous projects and ensure playbooks and training materials are reviewed & updated regularly Team Utilization Manage project assignments and hand off processes Ensure the team follows and upholds standardized process Quality Assurance / Client Satisfaction Ensure client satisfaction among internal and external stakeholders Responsible for creating and updating metrics indicating client satisfaction among internal and external stakeholders Project Execution / Delegation Provide oversight of client satisfaction among internal and external stakeholders Monitor and report metrics indicating client satisfaction among internal and external stakeholders Support the development of strategic partnerships to maintain profitable and long-lasting relationships with key clients Job Requirements Must have 10+ years of incident response or digital forensics experience with a passion for cyber security (consulting experience preferred) Proficient with host-based forensics, network forensics, malware analysis and data breach response Experienced with EnCase, Axiom, X-Ways, FTK, SIFT, ELK, Redline, Volatility, and open-source forensic tools Experience with a common scripting or programming language, including Perl, Python, Bash, or PowerShell Experience managing and mentoring forensic teams, preferably in a security, incident response or professional services consulting firm A deep understanding of working with legal counsel and the ability to thrive in a fast-paced environment, experience working with and communicating with C-level executives, attorneys, and insurance carriers Disclaimer The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. Work Environment While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodations may be made to enable people with disabilities to perform the essential functions of this job. Terms of Employment Salary and benefits shall be paid consistent with Arete salary and benefit policy. Declaration The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. #LI-ONSITE #LI-HYBRID
Roles & Responsibilities Reviews alerts generated by SentinelOne and implements appropriate containment and mitigation measures Proficient in SIEM, with a focus on QRadar SIEM, as well as threat monitoring and hunting within SIEM environments. Analyzes payloads using JoeSandbox and escalates to the appropriate team as necessary Collaborates with the Forensics team to conduct threat hunting using identified Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) Assists the Tiger Team in targeted collections of systems based on identified malicious activities in the client's environment Conducts historical log reviews to support threat hunting efforts and ensures all malicious artifacts are mitigated in the SentinelOne console Examines client-provided documents and files to supplement the SOC investigation and mitigation strategy Conducts perimeter scans of client infrastructure and reports any identified vulnerabilities to the Tiger Team for appropriate escalation Manages client-related tasks within the ConnectWise Manage ticketing system as part of the Client Handling Lifecycle Creates user accounts in SentinelOne console for the client Generates Threat Reports showcasing activity observed within the SentinelOne product Executes passphrase exports as needed for client offboarding Submits legacy installer requests to ensure the team is properly equipped for deployment Provides timely alert notifications to the IR team of any malicious activity impacting our clients Assists with uninstalling/migrating SentinelOne Generates Ranger reports to provide needed visibility into client environments Manages and organizes client assets (multi-site and multi-group accounts) Applies appropriate interoperability exclusions relating to SentinelOne and client applications Performs SentinelOne installation / interoperability troubleshooting as needed Contributes to the overall documentation of SOC processes and procedures Participates in “Handler on Duty (HOD) shifts as assigned to support the TT client matters Internally escalates support ticket / alerts to Tier II-IV Analysts as needed May perform other duties as assigned by management Skills And Knowledge Demonstrated knowledge of Windows and Unix operating systems Thorough understanding of Digital Forensics and Incident Response practices Proficiency in advanced analysis techniques for processing and reviewing large datasets in various formats Familiarity with TCP/IP and OSI Model concepts at a basic level Expertise in the Incident Response Life Cycle stages (Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned) Working knowledge of the MITRE ATT&CK framework at an intermediate level Proven ability to work independently and solve complex problems with little direction from management Highly detail-oriented and committed to producing quality work Job Requirements Associate’s degree and 6+ years of IT related experience or Bachelor’s Degree and 2-5 years related experience Current or previous knowledge of, or previous experience with, Endpoint Detection and Response (EDR) toolsets General knowledge of the Incident Handling Lifecycle Ability to communicate in both technical and non-technical terms both oral and written DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. PHYSICAL DEMANDS No physical exertion required Travel within or outside of the state Light work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force as frequently as needed to move objects TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. FLSA OVERTIME CATEGORY Job is exempt from the overtime provisions of the Fair Labor Standards Act. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better.
Roles & Responsibilities Reviews alerts generated by SentinelOne and implement appropriate containment and mitigation measures Analyzes payloads using JoeSandbox and escalates to the appropriate team as necessary Collaborates with the Forensics team to conduct threat hunting using identified Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) Assists the Tiger Team in targeted collections of systems based on identified malicious activities in the client's environment Conducts historical log reviews to support threat hunting efforts and ensures all malicious artifacts are mitigated in the SentinelOne console Examines client-provided documents and files to supplement the SOC investigation and mitigation strategy Stays up to date on the latest Threat Actor Tactics, Techniques and Procedures (TTPs) Conducts perimeter scans of client infrastructure and reports any identified vulnerabilities to the Tiger Team for appropriate escalation Manages client-related tasks within the ConnectWise Manage ticketing system as part of the Client Handling Lifecycle Creates user accounts in SentinelOne console for the client Generates Threat Reports showcasing activity observed within the SentinelOne product Execute passphrase exports as needed for client offboarding Submit legacy installer requests to ensure the team is properly equipped for deployment Provides timely alert notifications to the IR team of any malicious activity impacting our clients Assists with uninstalling/migrating SentinelOne Generates Ranger reports to provide needed visibility into client environments Manages and organizes client assets (multi-site and multi-group accounts) Applies appropriate interoperability exclusions relating to SentinelOne and client applications Performs SentinelOne installation / interoperability troubleshooting as needed Contributes to the overall documentation of SOC processes and procedures Investigates alerts escalated by Analysts (Tier I – Tier II) Escalates alerts to Tier IV as necessary Investigates alerts generated via custom rulesets Attends client calls to provide updates related to alerts seen on a client network, as needed Develops custom SentinelOne interoperability exclusion(s) on client request Contributes to the tuning and recommendation as it relates to the custom rulesets Participates in “Handler on Duty (HOD) shifts” as assigned to support the Tiger Team(s) client matters Develops internal Training/Process Documentation Contributes ideas or helps build innovations to increase SOC efficiencies Performs client external EDR/EPP threat hunts (Carbon Black, CrowdStrike, etc.) May perform other duties as assigned by management Skills And Knowledge Advanced understanding of Windows and Unix operating systems Thorough knowledge of EDR capabilities and investigations Advanced understanding of Digital Forensics and Incident Response practices Comprehensive analysis techniques for reviewing large datasets in various formats Strong analytical and problem-solving skills Demonstrated experience in threat intelligence and research Demonstrated experience in malware analysis and reverse engineering Expertise in PowerShell and Python scripting languages Thorough understanding of TCP/IP and OSI Model concepts Thorough understanding of the Incident Response Life Cycle stages (Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned) Thorough understanding of the MITRE ATT&CK framework Proven ability to work independently and solve complex problems with little direction from management. Highly detail-oriented and committed to producing quality work Job Requirements Bachelor's Degree and 6+ years of IT security related experience or Master's or Advanced Degree and 5+ years related experience Expert experience with Endpoint Detection and Response (EDR) toolsets Advanced experience working on a SOC/CIRT team Ability to communicate in both technical and non-technical terms both oral and written 2+ Information Security Certifications (GIAC, Offensive Security, EC-Council, ISC2) preferred DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. PHYSICAL DEMANDS No physical exertion required Travel within or outside of the state Light work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force as frequently as needed to move objects TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. FLSA OVERTIME CATEGORY Job is exempt from the overtime provisions of the Fair Labor Standards Act. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better.