About The Position

Lead and conduct proactive, hypothesis-based threat hunting activities using various techniques and tools to identify malicious activity, potential security breaches, security gaps, and opportunities for improved detection strategies. Design, develop, and implement advanced threat hunting strategies based on industry best practices, threat intelligence, and organizational risk assessments. Analyze network traffic, system logs, and other data sources to detect anomalies, patterns, and indicators of compromise (IOCs). Collaborate with other security teams, such as the Security Operations Center (SOC), Incident Response, Red Team, and engineering teams to enhance security defenses and validate hunt findings. Architect, develop, and maintain comprehensive threat hunting playbooks, procedures, and documentation. Create and maintain detailed documentation for all hunt activities, including monthly hunt worksheets and formal hunt reports as part of the team's deliverables. Present findings to both technical and non-technical audiences, to include senior leaders and executive management. Serve as a subject matter expert (SME), providing advanced technical expertise and mentorship to other security team members.

Requirements

  • Bachelor's degree in Computer Science, Information Security, or a related field
  • Minimum of 5+ years of experience in cyber security, with a focus on threat hunting, incident response, or security analysis
  • Expert understanding of networking protocols, operating systems, and security technologies
  • Proficiency in analyzing data from security tools such as SIEM, EDR tools, and log analysis platforms (e.g., Splunk)
  • Experience analyzing logs from various sources including firewalls, WAFs, proxies, and cloud environments
  • Experience with threat intelligence platforms and threat hunting frameworks
  • Knowledge of common attack techniques, malware families, and threat actor tactics, techniques, and procedures (TTPs)
  • Ability to develop and implement threat hunting strategies based on industry best practices and threat intelligence
  • Strong analytical and problem-solving skills
  • Excellent written and verbal communication skills
  • Security certifications such as GIAC Certified Reverse Engineering Malware (GREM), Certified Information Systems Security Professional (CISSP), or GIAC Certified Threat Hunter (GCTH)
  • Proven experience with scripting languages such as Python or PowerShell for automating security tasks and data analysis
  • In-depth knowledge of cloud security concepts and technologies
  • Experience with reverse engineering malware
  • Applied knowledge of data science and machine learning techniques for security analysis

Responsibilities

  • Lead and conduct proactive, hypothesis-based threat hunting activities
  • Design, develop, and implement advanced threat hunting strategies
  • Analyze network traffic, system logs, and other data sources to detect anomalies
  • Collaborate with other security teams to enhance security defenses and validate hunt findings
  • Architect, develop, and maintain comprehensive threat hunting playbooks, procedures, and documentation
  • Create and maintain detailed documentation for all hunt activities
  • Present findings to both technical and non-technical audiences
  • Serve as a subject matter expert (SME)

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Senior

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service