Cyber Security Analyst

Sorry, this job was removed at 9:24 a.m. (CST) on Tuesday, May 31, 2022
Find out who's hiring in Washington DC.
See all Cybersecurity + IT jobs in Washington DC
Apply
By clicking Apply Now you agree to share your profile information with the hiring company.

In this role, you will focus on developing and executing threat hunting operations to discover adversary activities that are not detected through traditional detection capabilities. You will be able to leverage first class security partners and threat intelligence teams to derive and hunt on known indicators of compromise, as well as developing strategies for discovering new techniques used by adversaries.

For greatest impact, you will develop and automate your hunt methodologies and findings to operationalize the capability across the Security Operations Center (SOC). Extending beyond the traditional blue team role, you will engage red teams and participate in purple team exercises that will build your perspective of the adversarial mindset as well as identify new techniques that need to be hunted. Finally, you will play a critical role in the continuous monitoring and response to major Incidents affecting the enterprise.

Responsibilities
Key responsibilities:

  • Develop, document, and execute threat hunting operations to detect known adversary TTPs.
  • Perform threat hunting operations across numerous data sets and security products to identify new and emerging adversary TTPs.
  • Build and deploy automation and tools that enable hunting methodologies, investigation techniques, data enrichment, and workflow efficiencies. Operationalize these capabilities across the SOC.
  • Document and communicate hunt methodologies and findings. Provide metrics to measure the impact of hunting operations.
  • Collaborate with internal security partners, red teams, and threat intelligence teams to identify, prioritize, and research threat actor behaviors.
  • Detect and respond to advanced threats, actor techniques, anomalous or suspicious activity, combined with intelligence, to identify potential and active risks to systems and data
  • Provide investigations, response, and root cause analysis to major incidents affecting the enterprise

Qualifications
Basic Qualifications:

  • Bachelor's degree in Computer Science or Engineering, or a related field, or equivalent alternative education, skills, and/or practical experience.
  • 3 years of experience in security operations, threat hunting and analysis, and/or incident response
  • At least 1 year of experience automating and/or scripting with Python, Jupyter Notebooks, PowerShell, C#, or javascript
  • At least 1 year of experience working with SQL-based databases, Kusto, Log Analytics.


Preferred Qualifications:

  • Must have strong verbal and written communication skills; ability to communicate effectively to internal and external business partners as well as technical, and non-technical staff
  • Demonstrated enthusiasm for learning new things and ability to pick up new ideas quickly
  • Participate in current operations shifts, on call rotation, and focus area rotations
  • Demonstrated knowledge of common/emerging attacks techniques.
  • Experience developing on Azure PaaS technologies such as; Functions (and Durable Functions), Storage (blob, table, queues) and Logic Apps
  • Experience correlating across very large and diverse datasets (Azure Data Lake, Azure Data Explorer, Cosmos DB).
  • Experience in analyzing a wide variety of network and host security logs to detect and resolve security issues
  • Understanding of common threat analysis model's such as the Diamond Model, Cyber Kill Chain, and MITRE ATT&CK
  • Deep understanding of system internals on MacOS, Windows, and Linux
  • Background in malware analysis
  • Experience working within a diverse organization to gain support for your ideas; Seeks to leverage work of others to increase effectiveness
  • Ability to effectively multi-task and prioritize in a fast-paced environment
  • Demonstrates maturity and leadership qualities when dealing with conflicting views and difficult conversations


The ideal candidate will have experience in a team environment, experience in a Security Operations Center or equivalent experience in enterprise scale services and platforms, experience in development of security tools and automated investigations to support hunting operations, technical depth in highly dynamic, complex environment.

More Information on Experfy
Experfy operates in the Artificial Intelligence industry. The company is located in Boston, MA. Experfy was founded in 2014. It has 78 total employees. To see all jobs at Experfy, click here.
Read Full Job Description
Apply Now
By clicking Apply Now you agree to share your profile information with the hiring company.

Similar Jobs

Apply Now
By clicking Apply Now you agree to share your profile information with the hiring company.
Learn more about ExperfyFind similar jobs