Junior Cyber Threat Hunter
MindPoint Group
MindPoint Group has an exciting opportunity for a Cyber Threat Hunter to support one of our largest law enforcement clients. This position is critical to the continued maturation of the client’s operational capabilities, and you will join an established and experienced group that is motivated to provide excellent services in defending federal infrastructure. You will work closely with other threat hunters, threat analysts, and an established SOC, and we will rely on you to hunt down the most advanced global threats. We need you to see the security stack and all of its capabilities, identify what might have gotten through and how, and aggressively pursue the threat.
Responsibilities:
Actively hunt for Indicators of Compromise (IOC) and APT Tactics, Techniques, and Procedures (TTP) using live and logged network, host, and cloud data. Create detailed Incident Reports and contribute to lessons learned in collaboration with the appropriate team Collaborate with the SOC and Threat Analysts to contain and investigate major incidents Provide simple and reusable hunt tactics and techniques to a team of security engineers, SIEM specialists, and SOC analysts Work with leadership and the engineering team to improve and expand available toolsets Analyze host, cloud, and network data including NetFlow, packet filtering, proxy firewalls, IPS/IDS data, and Endpoint Detection and Response (EDR) telemetry to create and implement a concrete plan of action to harden the defensive posture Monitor open source and commercial threat intelligence for IOCs, new vulnerabilities, software weaknesses, and other attacker TTPs.Required:
Advanced Degree (or additional relevant experience in lieu of) 2 years of relevant Cybersecurity experience (preferable SOC) Experience with securing and hardening IT infrastructure Demonstrated or advanced experience with computer networking and operating systems Experience with operational security, including security operations center (SOC), incident response, malware analysis, or IDS and IPS analyses Demonstrated proficiency with regular expression and scripting languages, including Python or PowerShell Demonstrated proficiency with data hunting, including ELK, LogScale, Splunk, Apache Spark, or AWS Stack Familiarity with: NetFlow data, DNS logs, Proxy Logs, AWS, and Azure Experience with network hunting, including Bro Logs, NetFlow, PCAP, or PaloAlto firewalls and proxies Knowledge of Windows and Linux OS’ and command line Ability to analyze malware, extract indicators, and create signatures in Yara, Snort, and IOCs Strong analytical skills and the ability to effectively research, write, communicate and brief varying levels of audiences to include at the executive level Knowledge related to the current state of cyber adversary tactics and trends Knowledge of the Splunk and LogScale search languages, search techniques, alerts, dashboards, and report building Knowledge of the TCP/IP networking stack and network IDS technologiesDesired:
Advanced Degree in CS-related field preferred Certifications Desired: CISSP, SANS GCTI, CCSP, GCFA, GCFE, GREM, GNFA, or OSCP CertificationLocation:
This is a hybrid role with current expectations of being on client site one day a week, however flexibility is required for mission needs.Clearance: TS/SCI required
Confirm your E-mail: Send Email
All Jobs from MindPoint Group