St. Petersburg, FL, US
55 days ago
Lead Threat Detection Engineer

This position will follow our hybrid work model, we expect the selected candidate to be in office 2-3 days a week at the St. Petersburg, FL Corporate office location.

Job Summary:
The financial services industry is constantly under attack by sophisticated cyber adversaries that range from nation states to criminals. In response, Raymond James trusts the Cyber Threat Center (CTC) with ensuring all equities are secure against all tiers of cyber adversaries. We are the central hub for Computer Network Operations and are on the front lines of security incident response, threat hunting, and intelligence. You will be working with emerging technologies to solve challenging security problems in a fast-paced and continuously evolving environment, while helping steer the direction and evolution of the team. This highly visible team within the organization evaluates threats to the environment and dynamically adjusts to the ever-changing threat landscape by applying practical security knowledge to developing new detective measures to protect the firm.

Essential Duties and Responsibilities:
• Role is highly focused on finding the unknown using a keen sense of awareness, deep understanding of system operations, networks, and adversaries’ techniques. You are highly motivated to search for the “needle in the haystack.”
• Design, develop and maintain threat detection content for Raymond James enterprise.
• Applies business knowledge and acute critical thinking to understand the usage of applications and systems when investigating anomalies.
• Serves as a primary member of the CTC who can be a technical escalation point of contact for incident handlers in a fast-paced environment.
• Writes clear and in-depth technical documentation on threat hunting activities during threat hunting operations.
• Mentors CTC analysts while contributing to the fulfillment of both the CTC’s mission and leadership’s vision
• Maintains situational awareness for cyber threats across the global firm and act where necessary
• Maintains knowledge of security principles and best practices. Must remain current with emerging threats and trends
• Leads or participates in information security related projects or in managing strategy
• Develop new forensic detective and investigative capabilities using current technical solutions
• Work with various business units and technical disciplines in a security consultant role for cyber threats
• Shares an on-call rotation and acts as an escalation point for Major cyber security incidents.
• Daily responsibilities include, but are not limited to:
o Signature creation and content development across various technologies and languages.
o In depth malware and exploit analysis.
o Organize threat actor techniques, tactics, and procedures against Cyber Threat Center detection capabilities
o Intrusion monitoring and response
o Data analysis and threat research

This position will follow our hybrid work model, we expect the selected candidate to be in office 2-3 days a week at the St. Petersburg, FL Corporate office location.

Job Summary:
The financial services industry is constantly under attack by sophisticated cyber adversaries that range from nation states to criminals. In response, Raymond James trusts the Cyber Threat Center (CTC) with ensuring all equities are secure against all tiers of cyber adversaries. We are the central hub for Computer Network Operations and are on the front lines of security incident response, threat hunting, and intelligence. You will be working with emerging technologies to solve challenging security problems in a fast-paced and continuously evolving environment, while helping steer the direction and evolution of the team. This highly visible team within the organization evaluates threats to the environment and dynamically adjusts to the ever-changing threat landscape by applying practical security knowledge to developing new detective measures to protect the firm.

Essential Duties and Responsibilities:
• Role is highly focused on finding the unknown using a keen sense of awareness, deep understanding of system operations, networks, and adversaries’ techniques. You are highly motivated to search for the “needle in the haystack.”
• Design, develop and maintain threat detection content for Raymond James enterprise.
• Applies business knowledge and acute critical thinking to understand the usage of applications and systems when investigating anomalies.
• Serves as a primary member of the CTC who can be a technical escalation point of contact for incident handlers in a fast-paced environment.
• Writes clear and in-depth technical documentation on threat hunting activities during threat hunting operations.
• Mentors CTC analysts while contributing to the fulfillment of both the CTC’s mission and leadership’s vision
• Maintains situational awareness for cyber threats across the global firm and act where necessary
• Maintains knowledge of security principles and best practices. Must remain current with emerging threats and trends
• Leads or participates in information security related projects or in managing strategy
• Develop new forensic detective and investigative capabilities using current technical solutions
• Work with various business units and technical disciplines in a security consultant role for cyber threats
• Shares an on-call rotation and acts as an escalation point for Major cyber security incidents.
• Daily responsibilities include, but are not limited to:
o Signature creation and content development across various technologies and languages.
o In depth malware and exploit analysis.
o Organize threat actor techniques, tactics, and procedures against Cyber Threat Center detection capabilities
o Intrusion monitoring and response
o Data analysis and threat research

Knowledge, Skills, and Abilities:
• Proficient with adversary techniques, tactics and procedures and can effectively map a TTP to the MITRE attack framework.
• Systems administrator experience in Linux, Unix, Windows or OSX operating systems
• Knowledge of networking and the common network protocols
• Demonstrated ability to create complex scripts, develop tools, or automate processes in Splunk SPL, PowerShell, or Python
• Knowledge of the following highly preferred:
o Knowledge of vulnerabilities and a comfort in manipulating exploit code for analysis
o Operating systems, such as Windows, Linux, or OSX
o Forensic and analytical techniques
o Networking and the common network protocols
o Demonstrated ability to create complex scripts, develop tools, or automate processes
o Demonstrated ability to perform static and dynamic malware analysis
o Demonstrated ability to analyze large data sets and identify anomalies
o Demonstrated ability to quickly create and deploy countermeasures under pressure
o Familiarity with common infrastructure systems that can be used as enforcement points

Education/Previous Experience:
• Typically requires a Bachelor's degree; 5 plus years of relevant experience. May have one or more technical or business-related certifications.
• Preferred experience includes four (4) years in conducting Cyber Network Defense, three (3) years of experience with incident response methodologies, malware analysis, penetration testing, scripting and/or forensics and four (4) years of experience with in-depth forensic and intrusion analysis
• One or more of the following certifications or the ability to obtain within 1 year:
o OSCP – Offensive Security Certified Professional
o OSCE – Offensive Security Certified Expert
o GXPN – Exploit Researcher and Advanced Penetration Testing
o GREM – GIAC Reverse Engineering Malware
o GCFA – GIAC Certified Forensic Analyst

Competencies:
• Analysis: Identify and understand issues, problems and opportunities; compare data from different sources to draw conclusions.
• Communication: Clearly convey information and ideas through a variety of media to individuals or groups in a manner that engages the audience and helps them understand and retain the message.
• Exercising Judgment and Decision Making: Use effective approaches for choosing a course of action or developing appropriate solutions; recommend or take action that are consistent with available facts, constraints, and probable consequences.
• Technical and Professional Knowledge: Demonstrate a satisfactory level of technical and professional skill, or knowledge, in position-related areas; remain current with developments and trends in areas of expertise.
• Building Effective Relationships: Develop and use collaborative relationships to facilitate the accomplishment of work goals.
• Client Focus: Make internal and external clients, and their needs, a primary focus of actions; develop and sustain productive client relationships.

Knowledge, Skills, and Abilities:
• Proficient with adversary techniques, tactics and procedures and can effectively map a TTP to the MITRE attack framework.
• Systems administrator experience in Linux, Unix, Windows or OSX operating systems
• Knowledge of networking and the common network protocols
• Demonstrated ability to create complex scripts, develop tools, or automate processes in Splunk SPL, PowerShell, or Python
• Knowledge of the following highly preferred:
o Knowledge of vulnerabilities and a comfort in manipulating exploit code for analysis
o Operating systems, such as Windows, Linux, or OSX
o Forensic and analytical techniques
o Networking and the common network protocols
o Demonstrated ability to create complex scripts, develop tools, or automate processes
o Demonstrated ability to perform static and dynamic malware analysis
o Demonstrated ability to analyze large data sets and identify anomalies
o Demonstrated ability to quickly create and deploy countermeasures under pressure
o Familiarity with common infrastructure systems that can be used as enforcement points

Education/Previous Experience:
• Typically requires a Bachelor's degree; 5 plus years of relevant experience. May have one or more technical or business-related certifications.
• Preferred experience includes four (4) years in conducting Cyber Network Defense, three (3) years of experience with incident response methodologies, malware analysis, penetration testing, scripting and/or forensics and four (4) years of experience with in-depth forensic and intrusion analysis
• One or more of the following certifications or the ability to obtain within 1 year:
o OSCP – Offensive Security Certified Professional
o OSCE – Offensive Security Certified Expert
o GXPN – Exploit Researcher and Advanced Penetration Testing
o GREM – GIAC Reverse Engineering Malware
o GCFA – GIAC Certified Forensic Analyst

Competencies:
• Analysis: Identify and understand issues, problems and opportunities; compare data from different sources to draw conclusions.
• Communication: Clearly convey information and ideas through a variety of media to individuals or groups in a manner that engages the audience and helps them understand and retain the message.
• Exercising Judgment and Decision Making: Use effective approaches for choosing a course of action or developing appropriate solutions; recommend or take action that are consistent with available facts, constraints, and probable consequences.
• Technical and Professional Knowledge: Demonstrate a satisfactory level of technical and professional skill, or knowledge, in position-related areas; remain current with developments and trends in areas of expertise.
• Building Effective Relationships: Develop and use collaborative relationships to facilitate the accomplishment of work goals.
• Client Focus: Make internal and external clients, and their needs, a primary focus of actions; develop and sustain productive client relationships.

At Raymond James our associates use five guiding behaviors (Develop, Collaborate, Decide, Deliver, Improve) to deliver on the firm's core values of client-first, integrity, independence and a conservative, long-term view.
We expect our associates at all levels to:
• Grow professionally and inspire others to do the same
• Work with and through others to achieve desired outcomes
• Make prompt, pragmatic choices and act with the client in mind
• Take ownership and hold themselves and others accountable for delivering results that matter
• Contribute to the continuous evolution of the firm

At Raymond James our associates use five guiding behaviors (Develop, Collaborate, Decide, Deliver, Improve) to deliver on the firm's core values of client-first, integrity, independence and a conservative, long-term view.
We expect our associates at all levels to:
• Grow professionally and inspire others to do the same
• Work with and through others to achieve desired outcomes
• Make prompt, pragmatic choices and act with the client in mind
• Take ownership and hold themselves and others accountable for delivering results that matter
• Contribute to the continuous evolution of the firm

At Raymond James – as part of our people-first culture, we honor, value, and respect the uniqueness, experiences, and backgrounds of all of our Associates.  When associates bring their best authentic selves, our organization, clients, and communities thrive. The Company is an equal opportunity employer and makes all employment decisions on the basis of merit and business needs.
Confirm your E-mail: Send Email