Join our Talent Network
Skip to main content

Cyber Threat Hunter

Location: Addison, TX, United States
Date Posted: Jun 15, 2021

Job Description

Description

Securonix provides the Next Generation Security and Information Event Management (SIEM) solution. As a recognized leader in the SIEM industry, Securonix helps some of largest organizations globally to detect sophisticated cyberattacks and rapidly respond to these attacks within minutes. With the Securonix SNYPR platform, organizations can collect billions of events each day and analyze them in near real time to detect advanced persistent threats (APTs), insider threats, privilege account misuses and online fraud. 

Securonix pioneered the User and Entity Behavior Analytics (UEBA) market and holds patents in the use of behavioral algorithms to detect malicious activities. The Securonix SNYPR platform is built on big data Hadoop technologies and is infinitely scalable. Our platform is used by some of the largest organizations in the financial, healthcare, pharmaceutical, manufacturing, and federal sectors. 

Job Description

Join our elite team of Cyber Hunters who identify and defeat advanced persistent threats (APT's) and analyze patterns to profile adversary groups to protect and defend the most coveted intelligence target in the world. Use your expertise of hunting out the Black Hat's playbook, identify anomalies, develop scenarios based on real-world cyber threat intelligence, and conduct analysis on the associated data sets. You will collaborate with the detection and incident response teams to hunt for adversary behavior and based on findings, develop logic to operationalize future detection by the incident response function. 

Responsibilities include, but are not limited to:

  • Construct and exploit threat intelligence to detect, respond, and defeat advanced persistent threats (APTs)
  • Fully analyze network and host activity in successful and unsuccessful intrusions by advanced attackers
  • Piece together intrusion campaigns, threat actors, and nation-state organizations
  • Manage, share, and receive intelligence on APT adversary groups
  • Generate intelligence from their own data sources and share it accordingly
  • Identify, extract, and leverage intelligence from APT intrusions
  • Expand upon existing intelligence to build profiles of adversary groups
  • Leverage intelligence to better defend against and respond to future intrusions
  • Conduct advanced threat hunt operations using known adversary tactics, techniques and procedures as well as indicators of attack in order to detect adversaries with persistent access to the enterprise
  • Create and add custom signatures, to mitigate highly dynamic threats to the enterprise using the latest threat information obtained from multiple sources
  • Conduct initial dynamic malware analysis on samples obtained during the course of an investigation or hunt operation in order to create custom signatures
  • Develop and produce reports on all activities and incidents to help maintain day to day status, develop and report on trends, and provide focus and situational awareness on all issues
  • Correlate data from intrusion detection and prevention systems with data from other sources such as firewall, web server, and DNS logs
  • Coordinate with appropriate organizations within the intelligence community regarding possible security incidents. Conduct intra-office research to evaluate events as necessary, maintain the current list of coordination points of contact.
  • Maintain knowledge of the current security threat level by monitoring related Internet postings, Intelligence reports, and other related documents as necessary

 

Required Experience/Skills:

  • Excellent interpersonal, organizational, writing, communications, and briefing skills
  • Exceptional analytical and problem solving skills
  • Minimum of 3 years of progressively responsible experience in Cyber Security, incident response, or related experience
  • Required Tools:

Familiarity with the following classes of enterprise cyber defense technologies:

  • Sysmon, PowerShell, or similar
  • Network and Host malware detection and prevention
  • Network and Host forensic applications
  • Web/Email gateway security technologies
  • Mitre ATT&CK framework
  • Cyber Network Operations/Penetration Test Methodologies and tools

 

Save Job Saved
Share: mail

Similar Jobs