Description

Key Responsibilities:
•              Collaborate with a senior cybersecurity specialist to conduct proactive threat hunting across endpoints, networks, and cloud environments.
•              Analyze security data from SIEM, EDR, and other telemetry sources to identify anomalies and potential threats.
•              Analyze network traffic, endpoint telemetry, and log data to identify indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs).
•              Develop and fine-tune detection rules, alerts, and dashboards to improve visibility and response times.
•              Perform deep-dive investigations into suspicious activity and provide detailed analysis and reporting. 
•              Collaborate with threat intelligence teams to correlate internal findings with external threat data.
•              Participate in the development of threat hunting playbooks and contribute to continuous improvement of detection methodologies.
•              Assist in the creation of reports and presentations to communicate findings to technical and non-technical stakeholders.
•              Support vulnerability management efforts by identifying and tracking remediation of security gaps.
•              Stay current with emerging threats, attack techniques, and cybersecurity trends.
________________________________________
Required Qualifications:
•              Bachelor’s degree in Cybersecurity, Computer Science, Information Security, or related field.
•              3+ years of experience in threat hunting, SOC analysis, or cyber threat intelligence.
•              Strong understanding of MITRE ATT&CK framework, kill chain models, and adversary emulation.
•              Experience with SIEM platforms (e.g., CrowdStrike, Sentinel, QRadar) and EDR tools (e.g., CrowdStrike, Defender).
•              Experience with email protection systems (e.g., Mimecast, Defender, Purview)
•              Strong analytical skills and the ability to interpret large datasets to identify patterns and anomalies.
•              Basic scripting knowledge (e.g., Python, PowerShell) for automation and data parsing.
•              Excellent analytical, investigative, and communication skills.

________________________________________
Preferred Certifications:
•              CompTIA Security+ or CySA+
•              GIAC Security Essentials (GSEC)
•              Certified SOC Analyst (CSA)
•              Microsoft SC-200 (Security Operations Analyst Associate)
 

Education

Bachelor's degree