Senior MDR Analyst

Blackpoint Cyber
5d

About The Position

Blackpoint Cyber is the leading provider of world-class cybersecurity threat hunting, detection and remediation technology. Founded by former National Security Agency (NSA) cyber operations experts who applied their learnings to bring national security-grade technology solutions to commercial customers around the world, Blackpoint Cyber is in hyper-growth mode, fueled by a recent $190m series C round. Day Shift: This shift is Saturday - Wednesday from 8:00 AM – 4:00 PM ET. Please note that the scheduled days and times for this role are non-negotiable. Applicants should ensure full availability before applying. Company Culture On this team, we value high-quality execution, ownership, and strong morals. With us, principles are never tested, and we are proud to always do right by our customers. If you’re a driven professional with a passion for learning and contributing towards the best, then Blackpoint welcomes you. Our team is energetic and collaborative, maintaining a high-performance culture and enabling growth through overcoming challenges in the modern cyberthreat landscape.

Requirements

  • Five (5+) years of experience in an information security role. Progressive relevant training and/or certification may be substituted for one (1) year of the experience requirement
  • Experience working in a Security Operations Center (SOC), Threat Hunting, or Digital Forensics and Incident Response (DFIR), preferred
  • Two (2+) years of experience with triaging endpoint events from EDR, NGAV, and supporting the Incident Response (IR) process
  • Deep knowledge on assessing threat indicators in a Windows Environment (e.g. Malware/Malicious Anomalies/Abnormal network Activity/Root Level Compromise, Forensic Artifacts, etc.)
  • Robust understanding of at least two of the following: Windows, Linux or OSX;
  • Familiarity with ELK stack (Dashboards, Logstash Config, Searching) Scripting / Programming with Powershell, Python, and Go
  • Familiarity with AWS services such as EC2, S3 and IAM and Azure/M365
  • Experience in developing, refining, and performing leadless threat hunting analysis to uncover new or potential incidents and report on results
  • Ability to work shifts if required (night, weekends, and day)
  • Excellent problem solving, critical thinking, and analytical skills with the ability to deconstruct issues (hunting anomalous pattern detection)
  • Excellent communication skills to effectively summarize and present findings

Nice To Haves

  • Bachelor’s Degree in Computer Science or related technical discipline
  • Network/System Administration and/or Engineering
  • Deep forensic knowledge of Windows, Mac OS and/or Linux
  • Malware Analysis (Behavioral and/or Static analysis- IDA, Cuckoo Sandbox, x86/x64 Debugging) Pentesting/Red/Blue Team
  • Capture The Flag (CTF) Development

Responsibilities

  • Analyze and evaluate anomalous network and system events in a 24×7 Security Operation Center (SOC) environment via conducting lead-less threat hunting
  • Collaborate with MDR Analysts to research and investigate emerging cyber security threats; become an escalation point of contact for advanced intrusion analysis.
  • Develop Incident analysis reports and work across business units and customers to bring issues to a close
  • Help design and build automation to reduce operational tasks of SOC processes
  • Provide actionable threat and vulnerability analysis based on security events for many independent customer environments
  • Build test lab environments to research emerging techniques and make contributions to the internal and external knowledge development of threat operations.
  • Review sandbox technologies for additional IOCs uncovered from artifacts uncovered during analysis.

Benefits

  • competitive Health, Vision, Dental, and Life Insurance plans
  • a robust 401k plan
  • Discretionary Time Off
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service