Position - Senior Threat Hunter
Minimum Work Experience -
- Overall 5+ years’ experience working in a large-scale IT environment focusing on Information Security.
- Minimum 3 years experience as Threat Hunter.
Education : - A Bachelor’s Degree in Computer Science or Information Technology (Any area).
Skills/Certifications - CTH or Any related cybersecurity certifications is a plus
Job Purpose:-
- To provide hunts in customer environment in order to identify any threat and report it to the client within the agreed SLA.
- Ability to handle high-pressure and complex situations.
- Analyze complex data to identify vulnerabilities and potential threats and provide reports timeously.
Key Responsibilities :-
- Conduct Proactive Threat hunting for potential malicious activity across multiple customers using SIEM, Analytics and EDR.
- Perform in-depth investigation of events of interest identified during threat hunt activities, anomalies or security alerts received from various security technologies.
- Create detection rules to support the automated identification of threats across the environment.
- Create search queries, dashboards and detect patterns within client environments matching Tactics, Techniques or procedures (TTPs) of known threat actors, malware or suspicious behaviors
- Hunting based on Threat Intelligence advisories.
- Exploration and integration of new cybersecurity testing tools, processes, and capabilities.
- Contribute to the tuning and development of hunting queries and other security control configurations to enhance threat detection capabilities.
- Continuously improve processes for use across multiple detection sets for more efficient operations.
- Provide support in the detection, response, mitigation, and reporting of cyber threats affecting client networks with the ability to evaluate IT environments and identify security goals, objectives, and requirements.
- Maintain and employ a strong understanding of advanced threats, continuous vulnerability assessment, response and mitigation strategies used in Cybersecurity operations.
- Perform risk analysis, attack simulation, analyze proof-of-concept exploits to create detections.