Threat Intelligence/Hunter Specialist
SOC Analyst - Threat Intelligence/Threat Hunting (2 openings)
Work Location: Remote (NYC Metro area)
Our customer is seeking several highly technical Threat Intelligence & Threat Hunting Specialists to deliver SOC Analyst services. This position is a part of the IT Threat Intelligence group within the Cyber Security Operations Center and will be expected to provide direct support to the 24/7 Cyber Security Monitoring group as needed. The responsibilities include, but are not limited to, the following:
• Ingestion & processing of intelligence across the security stack
• Dissemination of intelligence to internal stakeholders & external partners
• Track and develop threat actor profiles
• Threat Intelligence Platform (TIP) product administration
• Perform threat hunts across existing security stack utilizing the kill chain and MITRE ATT&CK framework
• Coordinate with MSSP & Third-party vendors to develop notable SOC dashboards & use cases
• Report on intelligence to management and business partners
• Assist the Threat Intelligence group in other functions including
• Incident Response & Forensics
• Threat Readiness
• Cyber Content Engineering & Automation
Skills:
• Experience working with a Threat Intelligence Platform (TIP)
• Understanding of MITRE ATT&CK Framework and TTPs
• Strong understanding of Defense-in-Depth
• Sandbox malware analysis (dynamic)
• Basic understanding and analysis of code such as Powershell, PERL, Python
• Cybersecurity certifications (preferred)
• Experience with OT & PCI technologies (preferred)
Minimum requirements:
• Bachelor's degree in Computer Science, Information Services, or IT Security related field or equivalent experience with at least 3 years of IT-Security experience.
• Minimum of 3 years of experience Tier 1 & 2 support for cyber security operation center.
Minimum of 3 years’ experience with processing threat intelligence & performing investigations
Apply tot his job
Apply To this Job