Lead the maturation of the Security Operations Team’s threat hunting practice
Proactively hunt for indicators of compromise (IOCs) across the network, endpoints, and cloud environments using threat intelligence and industry-standard hunting methodologies
Develop and execute complex searches across various data sets and apply macro data analysis skills to uncover anomalies.
Produce routine reporting for hunts executed, including technical reports at the completion of a hunt with substantive findings and semi-annual executive summary reports
Utilize various security and observability platform features in hunts for increased fidelity and better context.
Develop and refine threat hunting playbooks, procedures, and detection rules to improve the security team’s efficiency and effectiveness
Leverage automation and AI solutions to support and scale human-led hunt operations across client environments.
Collaborate with the Security Operations Team to integrate new threat intelligence and enhance existing security tools and controls
Mentor junior analysts and contribute to the ongoing improvement of the organization's overall security posture
Requirements
2-4 years of experience in a technical role in the areas of Security Operations, Incident Response, Detection Engineering, Offensive Security/Red Team, or Cyber Threat Intelligence
Proven, hands-on experience proactive security operations and threat hunting including a deep understanding of incident response frameworks, methodologies, and forensic techniques
Exceptional analytical and problem-solving skills with keen attention to detail with the ability to work independently with minimal supervision and manage multiple investigations simultaneously
Strong communication skills, capable of presenting complex technical information clearly to both technical and non-technical audiences
A proactive mindset and a passion for continuous learning in the rapidly evolving field of cybersecurity
Experience analyzing endpoint, network, cloud, and application logging for attack techniques at all stages of the cyber kill chain
Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways
Ability to apply Cyber Threat Intelligence through enrichment, correlation, and attribution
Ability to see the larger picture when dealing with competing requirements and needs from across the organization in order to build consensus and drive results
Ability to navigate and work effectively across a complex, geographically dispersed organization
Demonstrated ability to self-direct, with minimal supervision to achieve assigned goals
Experience performing security analysis and threat hunting in Cloud environments preferred.