Job Description
SOC Analyst - Threat Intelligence/Threat Hunting (2 openings) Work Location: Remote (NYC Metro area) Our customer is seeking several highly technical Threat Intelligence & Threat Hunting Specialists to deliver SOC Analyst services. This position is a part of the IT Threat Intelligence group within the Cyber Security Operations Center and will be expected to provide direct support to the 24/7 Cyber Security Monitoring group as needed. The responsibilities include, but are not limited to, the following: β’ Ingestion & processing of intelligence across the security stack β’ Dissemination of intelligence to internal stakeholders & external partners β’ Track and develop threat actor profiles β’ Threat Intelligence Platform (TIP) product administration β’ Perform threat hunts across existing security stack utilizing the kill chain and MITRE ATT&CK framework β’ Coordinate with MSSP & Third-party vendors to develop notable SOC dashboards & use cases β’ Report on intelligence to management and business partners β’ Assist the Threat Intelligence group in other functions including β’ Incident Response & Forensics β’ Threat Readiness β’ Cyber Content Engineering & Automation Skills: β’ Experience working with a Threat Intelligence Platform (TIP) β’ Understanding of MITRE ATT&CK Framework and TTPs β’ Strong understanding of Defense-in-Depth β’ Sandbox malware analysis (dynamic) β’ Basic understanding and analysis of code such as Powershell, PERL, Python β’ Cybersecurity certifications (preferred) β’ Experience with OT & PCI technologies (preferred) Minimum requirements: β’ Bachelor's degree in Computer Science, Information Services, or IT Security related field or equivalent experience with at least 3 years of IT-Security experience. β’ Minimum of 3 years of experience Tier 1 & 2 support for cyber security operation center. Minimum of 3 yearsβ experience with processing threat intelligence & performing investigations Apply tot his job
Ready to Apply?
Don't miss out on this amazing opportunity!
π
Apply Now