Job Description:
Role Responsibilities
Required Skills:
- Direct experience performing threat hunting in an active corporate environment.
- 8+ yearsof experience in a technical role in the areas of Security Operation, Incident Response, Detection Engineering, Offensive Security/Red Team, or Cyber Threat Intelligence.
- Experience analyzing system, network, and application logging for attack techniques at all stages of the cyber kill chain.
- Direct experience working with very large datasets and log analysis tools including but not limited to: Splunk, Python, Pandas, SQL, Hadoop, Hue.
- Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways
- Ability to apply Cyber Threat Intelligence through enrichment, correlation, and attribution
- Familiarity with offensive security strategies and assessment methodology
- Experience explaining threat hunt objectives in plain English and able to communicate associated risk.
- Ability to see the larger picture when dealing with competing requirements and needs from across the organization in order to build consensus and drive results.
- Ability to navigate and work effectively across a complex, geographically dispersed organization.
- Experience with more than one or more enterprise scale EDR and SIEM tools.
- Previous experience performing digital forensics or indecent response on major security incidents.
- Demonstrated ability to self-direct, with minimal supervision to achieve assigned goals.
Desired Skills
Beneficial but not required:
- Knowledge of basic Data Science concepts and processes.
- Experience with offensive security tools such as Cobalt Strike/Metasploit, techniques such as OSINT, and the methods used to compromise large enterprise networks.
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
1st shift (United States of America)