Cyber Hunt & Respond Principal Engineer

Truist BankAtlanta, GA
1d

About The Position

The Cyber Hunt & Respond Principal Engineer (Principal Hunter) is an advanced role within the 24/7 Cyber Fusion Center. This role has 2 core functions, proactive Threat Hunting & reactive Incident Response coverage. Hunting involves searching through large, diverse sets of internal and external data to discover previously undetected threats. This role is creative and owns the development of new hypotheses on how adversaries may be attacking the organization and will prove the hypotheses based on our available data. Additionally, this role will work with internal groups to express the data needs to explore potential threats. Principal Hunters demonstrate deep expertise across advanced querying languages, assembly-level analysis, Python, regular expressions, debugging and reverse engineering tools, anti-analysis and evasion techniques, security automation, and artificial intelligence (AI). They are responsible for designing, building, and operationalizing net new threat hunting capabilities that materially improve the organization’s ability to detect and respond to advanced adversaries (e.g. nation-state threats). In addition to hands on technical leadership, Principal Hunters serve as mentors and technical authorities for analysts, hunters, and incident responders. They provide guidance, coaching, and technical review to elevate the overall skill level, analytical rigor, and hunting maturity of the Cyber Fusion Center. This role participates in an on-call rotation and requires availability outside standard business hours, as necessitated by cyber incidents and imminent threat activity. For this opportunity, Truist will not sponsor an applicant for work visa status or employment authorization, nor will we offer any immigration-related support for this position (including, but not limited to H-1B, F-1 OPT, F-1 STEM OPT, F-1 CPT, J-1, TN-1 or TN-2, E-3, O-1, or future sponsorship for U.S. lawful permanent residence status.) As Digital Forensics & Incident Response (DFIR) professionals, individuals in this role must be well-versed in log, packet, network, endpoint, root cause analysis, containment, and eradication. A programming, computer science, or data science background will be important to success in this role as unstructured data will need automated decisions made and other data reduction techniques applied. Depending on the candidate, the role will likely start with basic searches and visualizations but may lead to pioneering use of Machine Learning and Artificial Intelligence techniques and tools. Familiarity with programming and malicious code critical to success in this role. This candidate must have a strong knowledge of windows internals to effectively respond to and eradicate advanced attacks. This role must advocate for the organization’s threat hunting efforts. The ability to quickly identify nefarious artifacts versus benign activity will be a key skill for this position. Cyber & Respond Engineers will be asked to consult on a variety of problems (technical and non-technical) within the team and larger organization. The Cyber Hunt & Respond Senior Engineer is responsible for conducting presentations and mentoring others interested or responsible for related data science, threat hunting, or incident response. Develop/invent highly innovative solutions within multiple information security technologies, theories and/or techniques that impact CIS strategy Develop security designs for systems and networks with multilevel security requirements Lead highly complex and visible projects with notable risk and complexity

Requirements

  • Bachelor’s degree in Computer Science, Computer Engineering, Cybersecurity, or related field of relevant education, certification, or related training.
  • 8 years of experience in Cybersecurity or related work
  • Knowledge of one or more cloud platforms and cloud security
  • Knowledge of general information technology (IT) and cybersecurity
  • Knowledge of computer networking concepts and protocols, and network security methodologies.
  • Knowledge of network traffic analysis and packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).
  • Knowledge of operating systems, including Windows/Unix ports and services.
  • Knowledge of modern identity and access management concepts
  • Knowledge of phishing tactics and techniques
  • Knowledge of advanced cyber threats and vulnerabilities.
  • Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • Knowledge of adversarial tactics, techniques, and procedures
  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.
  • Knowledge of incident response and handling methodologies.
  • Knowledge of countermeasures to address a variety of threats
  • Knowledge around leveraging automation, ML, and/or AI
  • Knowledge of advanced threat hunting techniques
  • Knowledge of types of digital forensics data and how to recognize them.
  • Knowledge of types and collection of persistent data.
  • Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]).
  • Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files.
  • Knowledge of processes for seizing and preserving digital evidence.
  • Strong functional and technical knowledge of information/cyber security capabilities with deep expertise in one or more of the following areas: Encryption, Data Security, Application Security, End Point Security, Identity and Access Management, Windows/Unix/Linux Systems Security, Mainframe Security, Perimeter Security, Network Security, Mobility Security, Cyber Security, Cryptography, or Authentication Systems
  • Strong understanding of service lifecycle management, strategic planning, and the cyber security landscape

Nice To Haves

  • Experience working in cloud environments, namely Microsoft Azure and Amazon AWS.
  • Master’s degree or MBA and ten years of experience in business analysis or an equivalent combination of education and work experience.
  • Banking or financial services experience
  • Prior management experience
  • Experience in leading large-scale complex projects from beginning to end
  • ISSEP Certification
  • Other security certifications (e.g. CCNA Security, GSEC, GCED, GPPA, etc.)
  • Other technical Certifications (e.g. CCNA, RHCE, MCSE, etc.)
  • Certification in Information Security Management (e.g. Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC) or Certified Information Security Manager (CISM)), or related security certification(s)

Responsibilities

  • As Digital Forensics & Incident Response (DFIR) professionals, individuals in this role must be well-versed in log, packet, network, endpoint, root cause analysis, containment, and eradication.
  • This role must advocate for the organization’s threat hunting efforts.
  • Cyber & Respond Engineers will be asked to consult on a variety of problems (technical and non-technical) within the team and larger organization.
  • The Cyber Hunt & Respond Senior Engineer is responsible for conducting presentations and mentoring others interested or responsible for related data science, threat hunting, or incident response.
  • Develop/invent highly innovative solutions within multiple information security technologies, theories and/or techniques that impact CIS strategy
  • Develop security designs for systems and networks with multilevel security requirements
  • Lead highly complex and visible projects with notable risk and complexity

Benefits

  • Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates.
  • Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays.
  • Depending on the position and division, this job may also be eligible for Truist’s defined benefit pension plan, restricted stock units, and/or a deferred compensation plan.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service