KEY RESPONSIBILITIES:
- Conduct threat detection, incident handling and hunting activities by leveraging security best practices and current detection/response platforms.
- Classify and prioritize threats through use of cyber threat intelligence, intrusion detection systems, firewalls and other boundary protection devices, and any security incident management products deployed.
- Develop use cases and create threat detection logic, rules, and alerting in SIEM for response by the Security Operations team.
- Work with leadership and stakeholders to recommend/implement processes, procedures, and technologies to improve the detection efforts.
- Operationalize Indicator of Compromise from intelligence feeds by developing, testing, and creating new alerting in the SIEM.
- Support the 24/7 Security Operations and Incident Response teams.
- 3+ years of experience in one or more of the following areas: offensive/defensive hunt techniques, malware analysis and Incident Response.
- Experience with content development and alert tuning.
- Expert knowledge of network monitoring and network exploitation techniques
- Ability to demonstrate analytical expertise, close attention to details, excellent critical thinking and learn and adapt quickly.
- Ability to learn and operate in a dynamic environment.
- Strong written communication skills.
- Experience working with cyber security tools and software such as Splunk, Symantec End Point, TrendMicro Antivirus, McAfee Web Gateway, Checkpoint Firewalls, Bluecoat, Sourcefire, Active Directory, or relevant cyber security assets.
- BA/BS or MA/MS in Engineering, Computer Science, Information Security, or Information Systems.
- Certifications such as GCFA, GREM or OSCP/OSCE
- Experience with scripting or programming languages such as Python, Bash or PowerShell.
- Experience with IOC related tools (e.g., YARA, OpenIOC)
- Experience with orchestration and automation tasks related to threat hunting and alert development.
- Experience with noise reduction/tuning F+.
- Threat hunter experience.
- Reverse engineering, malware analysis.