Proactively identify threats, insider misconduct, and anomalous behavior by leveraging threat intelligence, multi-source data, and collaborative brainstorming sessions.
Lead hunt missions to uncover malicious activity by analyzing command and control (C2) structures and developing network/host-based Indicators of Compromise (IOCs) or Indicators of Attack (IOAs).
Operational Excellence:
Utilize advanced threat hunting techniques and tools to detect, analyze, and respond to security threats.
Investigate and analyze alerts for suspicious or malicious activity across corporate environments, supporting remediation efforts.
Develop and execute proactive threat hunting methodologies by defining search criteria to uncover undetected threats.
Collaboration & Advisory:
Serve as a trusted advisor by collaborating with Cyber Security stakeholders to identify and address detection gaps.
Evaluate and recommend security tools and technologies for threat analysis, impact assessment, and mitigation.
Mentor team members by sharing knowledge, best practices, and technical expertise.
Incident Response & Forensics:
Support threat response efforts with ad-hoc threat hunts as needed.
Conduct root cause analysis, review incident lessons learned, and support compliance audits to improve overall security posture.
Apply foundational Digital Forensics and Incident Response (DFIR) processes to threat investigations.
Technical Proficiency:
Demonstrate expertise in Endpoint Detection and Response (EDR) tools (e.g., CrowdStrike, Microsoft Defender) and related security solutions (SIEM, data lakes, cloud platforms).
Utilize log analysis tools and large dataset analysis platforms, including Securonix, Snowflake, Python, Pandas, and SQL.
Employ scripting and automation using languages such as Python, PowerShell, or PERL and tools like Regular Expressions, YARA, SIGMA rules, FQL, and KQL.
Required Qualifications
Education:
Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field (advanced degree preferred).
Experience:
5+ years of hands-on experience in the cybersecurity industry with demonstrated roles in SOC, Incident Response, Threat Intelligence, Malware Analysis, IDS/IPS Analysis, or similar functions.
Proven track record in independently investigating and analyzing alerts for anomalous, suspicious, or malicious activity and supporting remediation efforts.
Technical Expertise:
Strong understanding of cyber adversarial tactics, techniques, and procedures (TTPs) related to Cyber Crime, Malware, Botnets, Hacktivism, Social Engineering, APTs, and Insider Threats.
Proficiency with advanced threat hunting tools and a solid grasp of adversarial frameworks such as MITRE ATT&CK and the Lockheed Martin Cyber Kill Chain.
Certifications (Preferred):
Relevant certifications such as Network+, Security+, CISSP, CISM, GCIH, GCFA, or cloud-specific certifications like AWS Cloud Practitioner, AWS Certified Security - Specialty, or Microsoft Certified: Azure Security Engineer Associate.