Evaluate tools, methodologies, and best practices to effectively understand the tactics, techniques, and procedures (TTPs) utilized by cyber threat actors.
Perform continuous research and collection of information based on our Company’s Intelligence Requirement Framework from open source, vendor collection, and internal tooling to identify threat intel and cyber risks.
Monitor and action open source and vendor data for potential domain abuse, third party cyber incidents, credential/data leakage, dark web and social media malicious indicators, and executive impersonation.
Conduct basic threat hunting within Security Information and Event Management (SIEM) systems and within specific tools for malicious indicators and threat actor TTPs.
Research vulnerabilities and manage vulnerability response and remediation processes in our Company environment.
Support development of visualizations for external stakeholders.
Support data management and development of technical solutions.
Provide briefings to ITRMS stakeholders and ITRMS LT.
Collaborate with internal stakeholders for information sharing.
Participate frequently as team representative during internal daily calls.
Support operational incidents via cyber threat analysis, hunting, and vulnerability management.
Requirements
High School Diploma required
Minimum of 2 years of relevant experience
Experience with cyberthreat intelligence, vulnerability management or malicious threat hunting
Solid technical knowledge of one or more areas cybersecurity areas such as incident response and digital forensics, security engineering, malware analysis, or security operations
Experience working with Threat Intelligence Platform and Collaboration tools
Experience working with extremely large data sets, using tools and scripting languages within Excel, Python, CrowdStrike Logscale, Microsoft Sentinel (KQL), and Power BI
Experience working with LLM models and prompt engineering
Independently delivers complex tasks applying critical thinking and care for detail.
Benefits
medical, dental, vision healthcare and other insurance benefits (for employee and family)
Lead Security Monitoring and Response Analyst at Mastercard coordinating enterprise crisis response and ensuring organizational resilience. Managing multi - region incident response and critical operations continuity.
IT - Security & Resilience Chief Engineer focusing on Security Monitoring for LBBW. Leading IT - Security projects and ensuring compliance and operational security within IT.
Director leading security operations and enhancing vulnerability management at IDEXX. Driving strategic execution and operational excellence across key domains in cybersecurity.
IT Security Operations Specialist ensuring security of global networks, systems, and data. Implementing security controls and performing advanced threat hunting using Microsoft Sentinel and Darktrace.
Staff SOC Analyst driving advanced threat detection and incident response for Sunrun's security team. Leading complex investigations, mentoring analysts, and improving detection capabilities in a remote setup.
GSOC Analyst focusing on critical events and risk management operations at Netflix. Monitoring global threats and coordinating incident management efforts in a hybrid work setting.
GSOC Analyst monitoring global events and managing critical incidents for Netflix's security operations. Ensuring timely communication and assessment during major security threats.
Security Operations Center Engineer enhancing security posture via automation and threat hunting. Requires strong experience with SIEM and SOAR platforms and Python scripting.
Security Operations Vulnerability Analyst II identifying and mitigating security vulnerabilities. Collaborating with teams to ensure timely risk remediation and protection of enterprise systems.
Cyber Defender (SOC Analyst) acts as the key point of contact for major security incidents. Coordinating response efforts and enhancing procedures at a leading AI - powered security partner.