Apply📍 United States
🔍 Cybersecurity
- 5+ years of experience in cybersecurity, preferably in threat intelligence, threat hunting, or incident response.
- Strong experience in SOC or MDR environments with a focus on threat investigations and incident handling.
- Expertise in cyber threat intelligence (CTI), malware analysis, and adversary tracking.
- Strong understanding of MITRE ATT&CK, cyber kill chain, and modern attack techniques.
- Hands-on experience with SIEM, EDR, and XDR platforms.
- Proficiency in log analysis, packet analysis, and forensic investigations.
- Familiarity with scripting and automation (Python, PowerShell, or equivalent).
- Proven experience in professional documentation and reporting, including Root Cause Analysis (RCA) and incident timelines.
- Excellent written and verbal communication skills, with the ability to translate technical details into executive-level insights.
- Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets.
- Conduct threat hunting and advanced incident investigations to detect and mitigate cyber threats.
- Actively research current threats, attack vectors, and tactics being exploited in the wild.
- Actively work with analysts and perform investigations on escalations.
- Provide ongoing recommendations to peers and partners on security tuning and best practices.
- Ability to discuss security posture with multiple clients and make recommendations to improve their holistic security approach.
- Conduct gap analysis for clients to better their security posture.
- Perform knowledge transfers, documentation, and training for partners regarding threat mitigation strategies.
- Assist in maintaining and developing Standard Operating Procedures (SOPs) for the analyst team.
- Develop and maintain incident response playbooks to standardize and improve security workflows.
- Work with internal teams to increase efficiency and effectiveness of security analysis provided by the threat analysis team.
- Provide quality assurance (QA) reviews of security alerts handled by team members.
- Train new analysts on security tools, methodologies, and investigative techniques.
- Investigate high-severity and complex threats, ensuring timely and effective response.
- Escalate critical security alerts to the VP of Threat Operations when required.
- Document and report on security incidents, including Root Cause Analysis (RCA) and event timelines.
- Provide executive briefings and reports on emerging threat trends and security incidents.
PythonCybersecurityLinuxDevOpsReportingScripting
Posted about 2 months ago
Apply