Description

Key Responsibilities

  • Threat Hunting & Analysis:
    • Proactively identify threats, insider misconduct, and anomalous behavior by leveraging threat intelligence, multi-source data, and collaborative brainstorming sessions.
    • Lead hunt missions to uncover malicious activity by analyzing command and control (C2) structures and developing network/host-based Indicators of Compromise (IOCs) or Indicators of Attack (IOAs).
  • Operational Excellence:
    • Utilize advanced threat hunting techniques and tools to detect, analyze, and respond to security threats.
    • Investigate and analyze alerts for suspicious or malicious activity across corporate environments, supporting remediation efforts.
    • Develop and execute proactive threat hunting methodologies by defining search criteria to uncover undetected threats.
  • Collaboration & Advisory:
    • Serve as a trusted advisor by collaborating with Cyber Security stakeholders to identify and address detection gaps.
    • Evaluate and recommend security tools and technologies for threat analysis, impact assessment, and mitigation.
    • Mentor team members by sharing knowledge, best practices, and technical expertise.
  • Incident Response & Forensics:
    • Support threat response efforts with ad-hoc threat hunts as needed.
    • Conduct root cause analysis, review incident lessons learned, and support compliance audits to improve overall security posture.
    • Apply foundational Digital Forensics and Incident Response (DFIR) processes to threat investigations.
  • Technical Proficiency:
    • Demonstrate expertise in Endpoint Detection and Response (EDR) tools (e.g., CrowdStrike, Microsoft Defender) and related security solutions (SIEM, data lakes, cloud platforms).
    • Utilize log analysis tools and large dataset analysis platforms, including Securonix, Snowflake, Python, Pandas, and SQL.
    • Employ scripting and automation using languages such as Python, PowerShell, or PERL and tools like Regular Expressions, YARA, SIGMA rules, FQL, and KQL.

Required Qualifications

  • Education:
    • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field (advanced degree preferred).
  • Experience:
    • 5+ years of hands-on experience in the cybersecurity industry with demonstrated roles in SOC, Incident Response, Threat Intelligence, Malware Analysis, IDS/IPS Analysis, or similar functions.
    • Proven track record in independently investigating and analyzing alerts for anomalous, suspicious, or malicious activity and supporting remediation efforts.
  • Technical Expertise:
    • Strong understanding of cyber adversarial tactics, techniques, and procedures (TTPs) related to Cyber Crime, Malware, Botnets, Hacktivism, Social Engineering, APTs, and Insider Threats.
    • Proficiency with advanced threat hunting tools and a solid grasp of adversarial frameworks such as MITRE ATT&CK and the Lockheed Martin Cyber Kill Chain.
  • Certifications (Preferred):
    • Relevant certifications such as Network+, Security+, CISSP, CISM, GCIH, GCFA, or cloud-specific certifications like AWS Cloud Practitioner, AWS Certified Security - Specialty, or Microsoft Certified: Azure Security Engineer Associate.

Education

Any Graduate