Truist Financial-posted 9 months ago
Full-time • Mid Level
Atlanta, GA
Credit Intermediation and Related Activities

The Cyber Hunt & Respond Engineer is an advanced, after-hours role within the 24/7 Cyber Fusion Center. This role has 2 core functions, proactive Threat Hunting & reactive Incident Response coverage. Hunting involves searching through large, diverse sets of internal and external data to discover previously undetected threats. This role is creative and responsible for developing with new hypotheses on how adversaries may be attacking the organization and will prove out the hypotheses based on our available data. Additionally, this role will work with internal groups to express the data needs to explore potential threats. This role is onsite and can be based in downtown Atlanta OR Zebulon, NC and will participate in an on-call rotation with the following shift options: ***2nd Shift, 3pm to 12am (midnight), Tuesday to Saturday (5-8 Schedule) *** Essential Duties and Responsibilities Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time. As Digital Forensics & Incident Response (DFIR) professionals, individuals in this role must be well-versed in log, packet, network, endpoint, root cause analysis, containment, and eradication. A programming, computer science, or data science background will be important to success in this role as unstructured data will need automated decisions made and other data reduction techniques applied. Depending on the candidate, the role will likely start with basic searches and visualizations but may ramp-up to leveraging Machine Learning and Artificial Intelligence tools. Familiarity with programming and malicious code critical to success in this role. Must have a strong knowledge of windows internals to effectively respond to and eradicate advanced attacks. This role must advocate for the organization's threat hunting efforts. The ability to quickly identify nefarious artifacts versus benign activity will be a key skill for this position. Cyber & Respond Engineers will be asked to consult on a variety of problems (technical and non-technical) within the team and larger organization.

  • Proactive Threat Hunting
  • Reactive Incident Response coverage
  • Searching through large, diverse sets of internal and external data to discover previously undetected threats
  • Developing new hypotheses on how adversaries may be attacking the organization
  • Working with internal groups to express data needs to explore potential threats
  • Consulting on a variety of technical and non-technical problems within the team and larger organization
  • Bachelor's degree in Computer Science, Computer Engineering, Cybersecurity, or related field
  • 6 years of experience in Cybersecurity or related work
  • Knowledge of one or more cloud platforms and cloud security
  • Knowledge of general information technology (IT) and cybersecurity
  • Knowledge of computer networking concepts and protocols, and network security methodologies
  • Knowledge of network traffic analysis and packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump)
  • Knowledge of operating systems, including Windows/Unix ports and services
  • Knowledge of modern identity and access management concepts
  • Knowledge of phishing tactics and techniques
  • Knowledge of advanced cyber threats and vulnerabilities
  • Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks)
  • Knowledge of adversarial tactics, techniques, and procedures
  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions
  • Knowledge of incident response and handling methodologies
  • Knowledge of countermeasures to address a variety of threats
  • Knowledge around leveraging automation, ML, and/or AI
  • Knowledge of advanced threat hunting techniques
  • Knowledge of types of digital forensics data and how to recognize them
  • Knowledge of types and collection of persistent data
  • Knowledge of file system implementations (e.g., NTFS, FAT, EXT)
  • Knowledge of which system files contain relevant information and where to find those system files
  • Knowledge of processes for seizing and preserving digital evidence
  • Experienced in a dedicated Threat Hunting role
  • Experienced working with EDR/XDR technology (e.g. CrowdStrike Products, Microsoft Defender Suite)
  • Experience working in cloud environments, namely Microsoft Azure and Amazon AWS
  • Industry certifications in general technology (e.g. Network+, AWS Certified Cloud Practitioner, Microsoft Azure Fundamentals, etc.)
  • Medical, dental, vision, life insurance
  • Disability and accidental death and dismemberment insurance
  • Tax-preferred savings accounts
  • 401k plan
  • At least 10 days of vacation during the first year of employment
  • 10 sick days
  • Paid holidays
  • Potential eligibility for defined benefit pension plan, restricted stock units, and/or deferred compensation plan
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service