drjobs Cyber Threat Hunting Analyst

Cyber Threat Hunting Analyst

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Dallas - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Job Title: Cyber Threat Hunting Analyst

Location: Onsite @Dallas TX

Job Type: Contract


Responsibilities:

  • Act as a trusted advisor on advanced threat hunting operations proactively identifying threats insider misconduct and anomalous behavior.
  • Lead hunt missions by leveraging threat intelligence multisource data and brainstorming sessions to uncover malicious activity.
  • Utilize advanced threat hunting techniques and tools to detect analyze and respond to security threats. This includes identifying threat actor groups analyzing command and control (C2) structures and developing network and hostbased Indicators of Compromise (IOCs) or Indicators of Attack (IOAs).
  • Investigate and analyze alerts for suspicious or malicious activity across corporate environments supporting remediation efforts.
  • Develop and execute proactive threat hunting methodologies including defining search criteria to uncover undetected threats.
  • Identify and address detection gaps by collaborating with Cyber Security stakeholders to enhance security controls and processes.
  • Evaluate and recommend security tools and technologies for threat analysis impact assessment and mitigation.
  • Conduct root cause analysis review incident lessons learned and support compliance audits to improve security posture.
  • Participate in threat hunting exercises and tabletop simulations to strengthen cyber resilience.
  • Mentor team members sharing knowledge and best practices to enhance their technical capabilities.
  • Detect and respond to threats using security solutions such as SIEM data lakes and cloud platforms.
  • Support threat response efforts and conduct adhoc threat hunts as needed.
  • Maintain technical proficiency in Information Security controls including endpoint cloud SaaS identity and network security.
  • Demonstrate expertise in Endpoint Detection and Response (EDR) tools and techniques.
  • Apply foundational knowledge of Digital Forensics and Incident Response (DFIR) processes to threat investigations.


Skills:

  • Bachelors degree in Cybersecurity Information Technology Computer Science or a related field; advanced degree preferred.
  • 4 years of experience in the cybersecurity industry with demonstrated roles in SOC Incident Response Threat Intelligence Malware Analysis IDS/IPS Analysis or related functions.
  • Proven ability to independently investigate and analyze alerts for anomalous suspicious or malicious activity in a corporate environment and support remediation efforts.
  • Experience conducting proactive threat hunts including developing custom search criteria and identifying intrusions or potential incidents.
  • Strong understanding of cyber adversarial tactics techniques and procedures (TTPs) related to Cyber Crime Malware Botnets Hacktivism Social Engineering APTs and Insider Threats.
  • Proficient in Endpoint Detection and Response (EDR) tools and capabilities with handson experience using CrowdStrike Microsoft Defender and other major vendors.
  • Foundational knowledge of Digital Forensics and Incident Response (DFIR) processes.
  • Experience with large dataset analysis and log analysis tools including Securonix Snowflake Python Pandas and SQL.
  • Skilled in using Regular Expressions YARA SIGMA rules FQL KQL and at least one scripting language such as Python PowerShell or PERL.
  • Strong understanding of cyber adversarial frameworks like MITRE ATT&CK and Lockheed Martins Cyber Kill Chain.
  • Handson experience hunting for Indicators of Compromise (IOCs) in SIEM and EDR tools such as Securonix Microsoft Defender Microsoft Purview Microsoft Sentinel Palo Alto XSOAR ThreatConnect and Recorded Future.
  • Excellent written and verbal communication skills with the ability to explain technical threat hunt objectives and findings to both technical and nontechnical audiences effectively communicating associated risks.
  • Certifications such as Network Security CISSP CISM GCIH GCFA and/or cloudspecific certifications like AWS Cloud Practitioner AWS Certified Security Specialty and Microsoft Certified: Azure Security Engineer Associate

Employment Type

Full Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.