.Key Skills and QualificationsExcellent investigative skills, insatiable curiosity and an innate drive to win.Strong problem-solving and trouble-shooting skills.Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one.An understanding of business needs and commitment to delivering high-quality, prompt and efficient service to the business.Self-motivated and possessing a high sense of urgency and personal integrity.Highest ethical standards and values.Experience defining and refining operational procedures, workflows and processes to support the team in consistent, quality execution of monitoring and detection.Good understanding of HSBC cyber security principles, global financial services business models, regional compliance regulations and laws.Good understanding and knowledge of common industry cyber security frameworks, standards and methodologies, including MITRE ATT&CK, OWASP, ISO2700x series, PCI DSS, GLBA, EU data security and privacy acts, FFIEC guidelines, CIS and NIST standards.Good communication and interpersonal skills with the ability to produce clear and concise reports for targeted audiences across internal and external stakeholders.Ability to speak, read and write in English, in addition to your local language.Technical SkillsTechnical expertise in analysing threat event data, evaluating malicious activity, documenting unusual files and data and identifying tactics, techniques and procedures used by attackers.Expert level knowledge and demonstrated experience in analysis and dissection of advanced attacker tactics, techniques and procedures in order to inform adjustments to the control plane.Expert level of knowledge and demonstrated experience of common Security Information and Event Management (SIEM) platforms for the collection and real-time analysis of security information.Expert level knowledge of Enterprise Detect and Response (EDR) tooling for the identification, prevention and detection of cyber-threats and for use in triage, investigation and threat hunting.Detailed knowledge and demonstrated experience of common cybersecurity technologies such as IDS / IPS / HIPS, Advanced Anti-malware prevention and analysis, Firewalls, Proxies, MSS, etc.Excellent knowledge and demonstrated experience of common operating systems and end user platforms to include Windows, Linux, Citrix, ESX, OSX, etc.Excellent knowledge of common network protocols such as TCP, UDP, DNS, DHCP, IPSEC, HTTP, etc. and network protocol analysis suits.Good knowledge and demonstrated experience in incident response tools, techniques and process for effective threat containment, mitigation and remediation.Functional knowledge of scripting, programming and/or development of bespoke tooling or solutions to solve unique problems