Threat Intelligence/Hunter Specialist

Remote, USA Full-time
SOC Analyst - Threat Intelligence/Threat Hunting (2 openings)Work Location:Remote (NYC Metro area)Our customer is seeking several highly technical Threat Intelligence & Threat Hunting Specialists to deliver SOC Analyst services. This position is a part of the IT Threat Intelligence group within the Cyber Security Operations Center and will be expected to provide direct support to the 24/7 Cyber Security Monitoring group as needed. The responsibilities include, but are not limited to, the following:• Ingestion & processing of intelligence across the security stack• Dissemination of intelligence to internal stakeholders & external partners• Track and develop threat actor profiles• Threat Intelligence Platform (TIP) product administration• Perform threat hunts across existing security stack utilizing the kill chain and MITRE ATT&CK framework• Coordinate with MSSP & Third-party vendors to develop notable SOC dashboards & use cases• Report on intelligence to management and business partners• Assist the Threat Intelligence group in other functions including• Incident Response & Forensics• Threat Readiness• Cyber Content Engineering & AutomationSkills:• Experience working with a Threat Intelligence Platform (TIP)• Understanding of MITRE ATT&CK Framework and TTPs• Strong understanding of Defense-in-Depth• Sandbox malware analysis (dynamic)• Basic understanding and analysis of code such as Powershell, PERL, Python• Cybersecurity certifications (preferred)• Experience with OT & PCI technologies (preferred)Minimum requirements:• Bachelor's degree in Computer Science, Information Services, or IT Security related field or equivalent experience with at least 3 years of IT-Security experience.• Minimum of 3 years of experience Tier 1 & 2 support for cyber security operation center. Minimum of 3 years’ experience with processing threat intelligence & performing investigations Apply tot his job
Apply Now
Back to Home