Verizon Communications-posted 10 months ago
Remote • Ashburn, VA
Telecommunications

As a Military Fellow in Network Security Threat Hunting at Verizon, you will be part of a team responsible for proactive detection of advanced threat actors within our network. This role involves hunting for evidence of threat activity and collaborating with network and security teams to enhance detection capabilities and security controls. You will continuously grow your technical skill set while conducting threat hunting operations in complex and critical network environments.

  • Conducting threat hunting operations in Verizon's most complex and critical network environments.
  • Analyzing log data to detect active threats within the network using knowledge of the current threat landscape, threat actor techniques, and the internal network.
  • Performing advanced threat research to proactively identify potential threat vectors and work with network and security teams to improve prevention and detection methods.
  • Leveraging Verizon's collected data to find indicators of compromise.
  • Developing expertise on the Verizon threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Verizon threat landscape.
  • Coordinating with multidisciplinary teams across network organizations to iteratively improve security controls and detection capabilities.
  • Conducting time-sensitive analysis during cyber investigations, including active threat hunting and malware analysis.
  • Analyzing malicious code, packet capture files, and artifacts.
  • Identifying gaps in logging capabilities and developing and proposing strategies to fill gaps.
  • Identifying and proposing automated alerts for new and previously unknown threats.
  • Collaborating with teams across the Cyber organization to mitigate risk by testing, deploying, and developing investigative playbooks.
  • Must be a current participant of the Department of Defense Skillbridge Program or of the Hiring our Heroes Corporate Fellowship Program.
  • Bachelor's degree or four or more years of work experience.
  • Three or more years of relevant experience required, demonstrated through work experience and/or military experience.
  • Two years of experience in cyber security or information technology.
  • Two years of experience conducting Cyber Security investigations.
  • Two years of experience working with SIEM Security Tools.
  • Two years of experience with system, application, and network logs.
  • Basic understanding of network device events, Netflow, and BGP data.
  • Three or more years of experience with incident response, security operations, malware analysis, or threat hunting.
  • Three or more years of experience with application of data science concepts and techniques to enable advanced threat detection.
  • Three or more years of experience with Red Teaming or Penetration Testing tools and techniques.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service