In a world of disruption and increasingly complex business challenges, our professionals bring truth into focus with the Kroll Lens. Our sharp analytical skills, paired with the latest technology, allow us to give our clients clarity-not just answers-in all areas of business. We embrace diverse backgrounds and global perspectives, and we cultivate diversity by respecting, including, and valuing one another. As part of One team, One Kroll
, you'll contribute to a supportive and collaborative work environment that empowers you to excel
We embrace diverse backgrounds and global perspectives, and we cultivate diversity by respecting, including, and valuing one another. As part of One team, One Kroll
, you'll contribute to a supportive and collaborative work environment that empowers you to excel.
Kroll's Cyber Risk team works on thousands of cybersecurity related incidents and engagements a year, including some of the most complex and highest profile matters in the world. With experts based around the world, supported by ground-breaking technology, we can help protect our client's data, people, operations and reputation with innovative investigations, response and proactive assessments.
At Kroll, your work will help deliver clarity to our clients' most complex governance, risk, and transparency challenges. Apply now to join One team, One Kroll
This position is remote. RESPONSIBILITIES:
We are looking for bright, motivated, and inquisitive minds to join our Kroll Responder 24x7 monitoring and response team who are experienced in and passionate about modern cyber threat hunting and active response. Our Vice Presidents use leading endpoint detection and response tools to rapidly identify, investigate, and respond to threats and threat actors impacting systems and networks around the globe every day.
- Perform ongoing threat hunting, analysis, containment, and remediation of threats identified through advanced endpoint detection and response (EDR), endpoint prevention (EPP), SIEM, and related security tools.
- Collect and review relevant forensic artifacts to identify root cause and understand nature of threats.
- Develop and communicate written and verbal threat reports associated with events to customers; peer review reports of other team members.
- Supervise and/or mentor associate team members as required
- Assist in ongoing research, development, and testing of enhanced threat detection and response tools, techniques, and indicators.
- Support incident engagement teams with active intrusion detection and response tasks.
- Conduct threat research, forensic analysis, and basic malware analysis of threats.
- Actively lead related client meetings and teleconferences.
- Advise clients on questions regarding threat detections, EDR tools, deployment, and maintenance.
- Bachelor's degree or higher in Computer Science, Cyber Security, Computer Engineering, or similar technical degree.
- Minimum 5 years' experience in threat hunting, detection, and response or equivalent experience.
- Ability to respond rapidly, multi-task, and communicate effectively both verbally and in writing with customers, team members, and engagement managers.
- Highly motivated, tenacious, assertive problem solver with a desire to analyze root cause and reach effective conclusions to active intrusions and incidents on an ongoing basis both individually and as part of larger response teams.
- Solid understanding of Windows operating system fundamentals, architecture (File System, registry, processes, binaries, DLL's, etc.) and administration concepts. Similar understanding of MacOS and/or Linux a plus.
- Prior experience actively using endpoint threat detection and response (EDR) products to investigate threats such as VMWare Carbon Black, Windows Defender ATP, Crowdstrike Falcon, Sentinel One, Trend Micro XDR, Tanium, or others.
- Understanding of common threat actor techniques, malware behavior and persistence mechanisms.
- Working knowledge of various scripting languages and tools (PowerShell, Python, VB, Yara)
- Working knowledge of TCP/IP and related networking concepts.
- Prior experience using Splunk or other SIEM solutions, intrusion detection solutions, or related security products.
- Relevant cyber security certifications including CISSP, GCIA, GCIH, GCFA, GMON, or GREM required.
- Excellent written and verbal communication skills
- Availability for occasional after-hours, weekends, and/or holiday work in response to active incidents.
- Must be a US citizen or a green card holder
In order to be considered for a position, you must formally apply via careers.kroll.com. Kroll is committed to creating an inclusive work environment. We are proud to be an equal opportunity employer and will consider all qualified applicants regardless of gender, gender identity, race, religion, color, nationality, ethnic origin, sexual orientation, marital status, veteran status, age or disability.
All employees must comply with Kroll's mandatory vaccination policy, subject to all applicable federal, state, and local laws.