Threat Hunt Analyst Jr

Overview

On Site
Depends on Experience
Contract - W2
No Travel Required

Skills

DNS
Forensic
Information Systems
Linux
Python
Researcher
Splunk
Threat
Threat Intelligence
Threat Models
firewalls
planning
self - starter

Job Details

Our Arlington VA based client is looking for Threat Hunt Analyst Jr. If you are qualified for this position, please email your updated resume in word format to lli@base-one.com

 

 

 

Primary Responsibilities

The ideal Cyber Threat Hunter is someone who is process driven, curious, and enjoys identifying patterns and anomalies in data that are not immediately obvious. The Cyber Threat Hunter will:

  • Create Threat Models to better understand the CBP IT Enterprise, identify defensive gaps, and prioritize mitigations
  • Author, update, and maintain SOPs, playbooks, work instructions
  • Utilize Threat Intelligence and Threat Models to create threat hypotheses
  • Plan and scope Threat Hunt Missions to verify threat hypotheses
  • Proactively and iteratively search through systems and networks to detect advanced threats
  • Analyze host, network, and application logs in addition to malware and code
  • Prepare and report risk analysis and threat findings to appropriate stakeholders
  • Create, recommend, and assist with development of new security content as the result of hunt missions to include signatures, alerts, workflows, and automation
  • Coordinate with different teams to improve threat detection, response, and improve overall security posture of the Enterprise

 

 

Basic Qualifications

 

NEW REQUIREMENT as of 6/27/2022:  In addition to uploading the resume, please email us a copy of the candidate’s current certifications (actual certificate) as a way to validate that certs are current and active.

 

The ideal candidate will have the following qualifications:

  • Expertise in network and host based analysis and investigation
  • Demonstrated experience planning and executing threat hunt missions
  • Understanding of complex Enterprise networks to include routing, switching, firewalls, proxies, load balancers
  • Working knowledge of common (HTTP, DNS, SMB, etc) networking protocols
  • Familiar with operation of both Windows and Linux based systems
  • Proficient with scripting languages such as Python or PowerShell
  • Familiarity with Splunk Search Processing Language (SPL) and/or Elastic Domain Specific Language (DSL)

 

The candidate must currently possess a Top Secret Clearance. In addition to clearance requirement, all CBP personnel must have a current or be able to favorably pass a 5 year background investigation (BI).

Should have 2 years of experience serving as a SOC Analyst or Incident Responder

Ability to work independently with minimal direction; self-starter/self-motivated

 

Requirement Certifications/One of the following certifications

CCFP – Certified Cyber Forensics Professional

CCNA Security

CCNP Security

CEH – Certified Ethical Hacker

CHFI – Computer Hacking Forensic Investigator

CISSP – Certified Information Systems Security

ECES – EC-Council Certified Encryption Specialist

ECIH – EC-Council Certified Incident Handler

ECSA – EC-Council Certified Security Analyst

ECSS – EC-Council Certified Security Specialist

EnCE

ENSA – EC-Council Network Security Administrator

GCFA – Forensic Analyst

GCFE – Forensic Examiner

GCIH – Incident Handler

GISF – Security Fundamentals

GNFA – Network Forensic Analyst

GREM – Reverse Engineering Malware

GWEB – Web Application Defender

GXPN – Exploit Researcher and Advanced Penetration Tester

LPT – Licensed Penetration Tester

OSCE (Certified Expert)

OSCP (Certified Professional)

OSEE (Exploitation Expert)

OSWP (Wireless Professional)

CIRC

FIWE

WFE-E-CI

FTK-WFE-FTK

 

 

Required Education/Experience

BS degree in Science, Technology, Engineering, Math or related field and 3 years of prior relevant experience with a focus on CyberSecurity or Masters with 1 years of prior relevant experience.

 

 

 

About Base One Technologies