IT Cybersecurity Analyst - Threat Hunting Engineer

Career finderMilwaukee, WI
19dHybrid

About The Position

WBS, a subsidiary of WEC Energy Group, is seeking a Threat Hunting Engineer in our Milwaukee, Green Bay, or Chicago locations. This position currently offers flexibility for a hybrid work arrangement (remote/on-site) with time spent in the office.   This position is part of a job family (IT Cybersecurity Analyst, Senior IT Cybersecurity Analyst, and Principal IT Cybersecurity Analyst) where experience will be the determining factor.   About Us   WEC Energy Group is one of the nation’s largest electric generation and distribution and natural gas delivery holding companies serving 4.7 million customers across the Midwest. We are committed to providing clean, reliable, and affordable energy in an environmentally sustainable manner. Customers are the heart of our business, and we work every day to help grow and support communities where we provide vital energy services.   As a Fortune 500 company, we value and develop our employees who are making a difference in a mission that matters. We don’t just offer a job; we provide fulfilling careers where safety and well-being are paramount. Join our team and experience first-hand our commitment to your success. We offer competitive pay and benefits to recognize your hard work and dedication.   If you’re talented, energetic and ready for a career with a future, we want you on our team. We are powered by a diverse and inclusive workforce fueled by the pride in what we do. If you're driven by the passion to change lives, this is the place for you.

Requirements

  • Bachelor’s degree in computer science, computer engineering, software engineering, information technology, computer information systems, MIS, or engineering is preferred. A combination of associate degree, military or professional cybersecurity experience and cybersecurity certification (CISSP, GAIC, MCSE, CEH, GICSP, CSSA, CISM) will be considered.
  • 2+ years Cybersecurity experience

Nice To Haves

  • Understanding of cyber threats, attack vectors, and common exploitation techniques.
  • Experience with Threat Hunting techniques on both the endpoint and network data
  • Proficiency in using threat intelligence platforms, open-source tools, and security information and event management (SIEM) systems.
  • Ability to identify attacker Tactics, Techniques and procedures (TTPs)
  • Understanding of enterprise architectures and large IT environments
  • Excellent communication and interpersonal skills.

Responsibilities

  • Conduct in-depth analysis and research to attribute cyber threats and attacks, including identifying threat actors, their motivations, tactics, techniques, and procedures (TTPs), and providing insights on their potential impact on the organization.
  • Ability to classify, categorize, and analyze malware and threats.
  • Monitor and assess the global threat landscape, including threat actors, malware, hacking techniques, and geopolitical events that may impact the organization.
  • Provide metrics on overall threat activity within and outside of WEC
  • Collaborate with internal teams to provide timely and actionable intelligence to support incident response, vulnerability management, and other cybersecurity initiatives.
  • Design, implement and administer enterprise solutions that proactively search for and identify malicious activity within their environments.
  • Correlate threat environment from SIEM threat feeds to the latest risk analysis report
  • Develop and maintain threat profiles, indicators of compromise (IOCs), and tactical reports to enhance detection and response capabilities.
  • Perform root cause analysis and provide recommendations for proactive measures to help prevent cyber-attacks.
  • Continuously update and refine existing threat intelligence processes and methodologies to ensure the organization remains at the forefront of cyber defense.
  • Stay informed about the latest trends, tools, and techniques in the field of threat intelligence and incorporate best practices into daily operations.
  • Support threat assessment initiatives such as security assessments and penetration testing.
  • Present findings and insights to technical and non-technical stakeholders, including executives, to enhance overall cyber risk awareness.
  • Actively search for the evidence of hidden threats within environments that bypass both preventative and detective controls using delivery methodology and threat hunting tools and techniques.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service