Cyber Threat Analyst

Overview

On Site
Depends on Experience
Full Time

Skills

threat analysis
threat hunting

Job Details

Valiant Solutions is seeking multiple Cyber Threat Analysts in the Washington DC area to join our rapidly growing and innovative cybersecurity team!

The Cyber Threat Analyst support a 24x7x365 SOC and are responsible for monitoring and analyzing security events to identify potential threats and vulnerabilities within the organization's infrastructure. They utilize advanced threat intelligence sources, security tools, and techniques to detect and investigate security incidents, assess the impact, and recommend appropriate mitigation strategies. Additionally, they collaborate with cross-functional teams to develop and implement proactive measures to enhance the organization's security posture and minimize risk exposure.

Valiant Solutions is a company that cares about its employees- we've been named one of the in the Washington DC area TEN years in a row! If you are interested in learning more about Valiant and this opportunity, we invite you to apply now!

Qualifications:

  • ship and the ability to obtain a federal clearance, up to a Top Secret clearance.
  • A minimum of 3 - 5+ years of direct experience providing threat hunt support, including performing log and event review and incident response.
  • At least one of the following or equivalent IT certifications: CEH (Certified Ethical Hacker), GSEC (GIAC Security Essentials), GCIH (GIAC Certified Incident Handler), Security+
  • Experience leveraging KQL (or similar query language) in support of threat hunt duties.
  • Experience leveraging SIEM, SOAR, and other tools to identify threat activity and incidents.
  • Experience in providing threat hunt support with accuracy for effective resolution and documentation purposes.
  • Experience in supporting multiple cybersecurity incidents simultaneously.
  • Experience in adapting easily to learning new technologies.
  • Ability to follow written and verbal instructions.
  • Experience with problem-solving new incidents without knowledge of articles.
  • Experience with creating and editing SOP and incident reports.
  • Excellent communication skills, with the ability to articulate technical findings and recommendations to both technical and non-technical stakeholders, including senior management.

Preferred Education and Experience:

  • BS in Computer Science, Information Systems, Mathematics, Engineering, or a related field is preferred, but not required.
  • Proficiency with M365 Defender and Azure Sentinel.

Responsibilities:

  • Develop and execute strategic plans for proactive threat-hunting initiatives to identify and mitigate potential security threats before they escalate.
  • Collaborate with cross-functional teams, including SOC (Security Operations Center) analysts, incident responders, and threat intelligence analysts, to prioritize and investigate potential threats.
  • Conduct in-depth analysis of security logs, network traffic, and endpoint data to identify anomalous behavior and indicators of compromise (IOCs).
  • Analyze security incidents to identify indicators of compromise (IOCs), attack vectors, and potential threats to the organization's assets and data.
  • Investigate and triage security alerts to determine the severity, impact, and root cause of security incidents.
  • Utilize advanced threat-hunting techniques and tools to proactively search for and identify emerging threats and vulnerabilities within the organization's infrastructure.
  • Develop and maintain threat-hunting playbooks, methodologies, and standard operating procedures (SOPs) to streamline and enhance the effectiveness of threat-hunting activities.
  • Stay abreast of the latest cyber threats, attack techniques, and industry best practices to continually improve threat-hunting capabilities.
  • Provide regular reports and updates to senior management on the findings, insights, and recommendations resulting from threat-hunting activities.
  • Drive continuous improvement initiatives to optimize threat-hunting processes, tools, and techniques based on lessons learned and industry trends.