Overview
On Site
Full Time
Skills
Computer Science
Information Technology
IT Management
Information Security
Data Governance
Event Management
Intrusion Detection
Network Monitoring
PASS
Vulnerability Management
Analytical Skill
Security Operations
Incident Management
Root Cause Analysis
Vulnerability Assessment
Security Architecture
System Monitoring
Optimization
Cyber Security
SIEM
IDS
Threat Analysis
Taxes
Security Clearance
Regulatory Compliance
Training
LinkedIn
Job Details
Job Title: Cyber Threat Hunter & Incident Response Lead (SIEM, EDR, IDS GA DOR)
Location: Atlanta, GA (Hybrid - Local to Metro Atlanta)
We are currently seeking candidates who meet the following qualification
Mandatory Qualifications- Bachelor's degree in Computer Science, Information Technology, Information Security or a related field, or equivalent professional experience.
- Minimum of 4 years of proven experience and demonstrated success in technology leadership with emphasis on information security and data governance.
- Hands-on experience with cybersecurity tools and technologies including:
- Security Information and Event Management (SIEM)
- Endpoint Detection and Response (EDR)
- Intrusion Detection Systems (IDS)
- Strong technical expertise in network monitoring, security frameworks, and security software solutions.
- Must be eligible to work and pass a comprehensive background check (including Georgia tax compliance and fingerprinting).
- Experience in proactive threat hunting and detection of sophisticated threats that evade automated systems.
- Proficiency in integrating and analyzing data from MISP or other threat intelligence platforms.
- Demonstrated ability to lead and execute incident response plans and root cause analysis for complex security incidents.
- Strong understanding of vulnerability management tools, techniques, and methodologies.
- Familiarity with designing and implementing security architectures and optimizing cybersecurity tools and processes.
- Analytical mindset with the ability to interpret threat intelligence from multiple sources and apply it to security operations.
- Advanced Threat Hunting: Proactively identify sophisticated, covert threats that bypass automated detection systems.
- Complex Incident Response: Investigate, triage, and respond to security incidents; document findings and perform root cause analysis.
- Vulnerability Assessment: Conduct thorough vulnerability assessments, analyze asset discovery data, and identify security gaps.
- Security Architecture: Design and implement security solutions involving advanced technologies and threat intelligence platforms.
- System Monitoring & Response: Actively monitor networks for unauthorized activities and respond to incidents promptly.
- Tool Optimization: Evaluate and optimize existing cybersecurity tools (SIEM, EDR, IDS); recommend and implement new technologies or processes.
- Threat Intelligence Integration: Integrate various threat intelligence feeds into platforms like MISP to improve detection capabilities.
Tax Clearance Letter, due at the time of submission* (pls review compliance tab for instruction on how the CANDIDATE must obtain this letter)
If you meet these qualifications, please submit your application via link provided in Linkedin.
Kindly do not call the general line to submit your application.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.