Key Responsibilities:
Threat Hunting:
- Conduct proactive threat hunting activities by identifying indicators of compromise (IoCs) and tactics techniques and procedures (TTPs) that could suggest malicious behavior or security breaches.
- Analyze large volumes of logs network traffic endpoint data and other securityrelated information to identify potential threats.
Incident Response:
- Assist the Security Operations Center (SOC) with advanced threat analysis and support ongoing incident response efforts.
- Lead investigations into identified incidents and work with other teams to mitigate and contain threats in realtime.
Threat Intelligence:
- Stay current with the latest threat intelligence emerging cyber threats and advanced attack techniques targeting the financial industry.
- Integrate threat intelligence into security tools and processes to enhance the detection and response capabilities of the organization.
Tool Utilization & Optimization:
- Utilize a wide range of security tools (e.g. SIEM EDR IDS/IPS etc.) to detect analyze and respond to threats.
- Continuously optimize threat hunting processes and recommend new tools and technologies to improve detection and defense mechanisms.
Collaboration:
- Work closely with other members of the cybersecurity team including vulnerability management SOC and threat intelligence teams to ensure cohesive threat defense strategies.
- Partner with IT and other business units to understand the evolving threat landscape and its impact on banking operations.
Reporting & Documentation:
- Document all findings including techniques used threats identified and the impact on the business.
- Provide detailed reports on threat hunting activities and contribute to afteraction reviews postincident.
Education:
Bachelors degree in Information Security Computer Science or a related field (or equivalent experience).
Experience:
- 35 years of experience in cybersecurity with at least 2 years of experience in threat hunting incident response or SOC roles.
- Experience within the banking or financial services industry is highly preferred.
Technical Skills:
- Strong understanding of cybersecurity frameworks (e.g. MITRE ATT&CK NIST).
- Proficiency with security tools like SIEM (Splunk QRadar etc.) endpoint detection and response (EDR) intrusion detection/prevention systems (IDS/IPS) and malware analysis platforms.
- Knowledge of scripting languages (Python PowerShell) and ability to automate threat hunting processes.
Certifications:
Relevant cybersecurity certifications such as Certified Ethical Hacker (CEH) GIAC Certified Incident Handler (GCIH) or Certified Information Systems Security Professional (CISSP) are a plus.
Soft Skills:
- Strong analytical and problemsolving skills with attention to detail.
- Excellent communication skills both written and verbal with the ability to convey complex security topics to nontechnical stakeholders.
- Ability to work independently and as part of a collaborative team.
Candidate Profile: Looking at a candidate with experience in threat hunting hypothesis wherein they proactively search for potential threats or malicious activities within an organization.
threat hunting,hypothesis,threat hunter,Incident Response,Threat Intelligence