drjobs Cyber Hunt and Respond Sr Engineer

Cyber Hunt and Respond Sr Engineer

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Atlanta, GA - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

The position is described below. If you want to apply click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application youll be invited to create a profile which will let you see your application status and any communications. If you already have a profile with us you can log in to check status.

Need Help

If you have a disability and need assistance with the application you can request a reasonable accommodation. Send an email to Accessibility (accommodation requests only; other inquiries wont receive a response).

Regular or Temporary:

Regular

Language Fluency: English (Required)

Work Shift:

1st shift (United States of America)

Please review the following job description:

The Cyber Hunt & Respond Senior Engineer is an advanced after-hours role within the 24/7 Cyber Fusion Center. This role has 2 core functions proactive Threat Hunting & reactive Incident Response coverage.
Hunting involves searching through large diverse sets of internal and external data to discover previously undetected threats. This role is creative and owns the development of new hypotheses on how adversaries may be attacking the organization and will prove out the hypotheses based on our available data. Additionally this role will work with internal groups to express the data needs to explore potential threats.

Essential Duties and Responsibilities

Following is a summary of the essential functions for this job. Other duties may be performed both major and minor which are not mentioned below. Specific activities may change from time to time.

1. As Digital Forensics & Incident Response (DFIR) professionals individuals in this role must be well-versed in log packet network endpoint root cause analysis containment and eradication.

2. A programming computer science or data science background will be important to success in this role as unstructured data will need automated decisions made and other data reduction techniques applied. Depending on the candidate the role will likely start with basic searches and visualizations but may lead to pioneering use of Machine Learning and Artificial Intelligence techniques and tools. Familiarity with programming and malicious code critical to success in this role.

3. This candidate must have a strong knowledge of windows internals to effectively respond to and eradicate advanced attacks. This role must advocate for the organizations threat hunting efforts. The ability to quickly identify nefarious artifacts versus benign activity will be a key skill for this position. Cyber & Respond Engineers will be asked to consult on a variety of problems (technical and non-technical) within the team and larger organization.

4. The Cyber Hunt & Respond Senior Engineer is responsible for conducting presentations and mentoring others interested or responsible for related data science threat hunting or incident response.

Qualifications

Required Qualifications:

The requirements listed below are representative of the knowledge skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

1. Bachelors degree in Computer Science Computer Engineering Cybersecurity or related field of relevant education certification or related training.

2. 8 years of experience in Cybersecurity or related work

3. Knowledge of one or more cloud platforms and cloud security

4. Knowledge of general information technology (IT) and cybersecurity

5. Knowledge of computer networking concepts and protocols and network security methodologies.

6. Knowledge of network traffic analysis and packet-level analysis using appropriate tools (e.g. Wireshark tcpdump).

7. Knowledge of operating systems including Windows/Unix ports and services.

8. Knowledge of modern identity and access management concepts

9. Knowledge of phishing tactics and techniques

10. Knowledge of advanced cyber threats and vulnerabilities.

11. Knowledge of cyber-attack stages (e.g. reconnaissance scanning enumeration gaining access escalation of privileges maintaining access network exploitation covering tracks).

12. Knowledge of adversarial tactics techniques and procedures

13. Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.

14. Knowledge of incident response and handling methodologies.

15. Knowledge of countermeasures to address a variety of threats

16. Knowledge around leveraging automation ML and/or AI

17. Knowledge of advanced threat hunting techniques

18. Knowledge of types of digital forensics data and how to recognize them.

19. Knowledge of types and collection of persistent data.

20. Knowledge of file system implementations (e.g. New Technology File System NTFS File Allocation Table FAT File Extension EXT).

21. Knowledge of which system files (e.g. log files registry files configuration files) contain relevant information and where to find those system files.

22. Knowledge of processes for seizing and preserving digital evidence.

Preferred Qualifications:

1. Experience working in cloud environments namely Microsoft Azure and Amazon AWS.

2. Industry certifications in general technology (e.g. Network AWS Certified Cloud Practitioner Microsoft Azure Fundamentals etc.)

3. Industry certifications in cyber security such as: Security CySA GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Examiner (GCFE) GIAC Cloud Forensics Responder (GCFR) GIAC Certified Forensic Analyst (GCFA) GIAC Network Forensic Analyst (GNFA) GIAC Reverse Engineering Malware Certification (GREM) etc.

4. Experience in Cyber Breach Response Security Operations Center (SOC) Network Operations Center (NOC) IT/Cyber Engineering or Intelligence Community (IC)

General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits though eligibility for specific benefits may be determined by the division of Truist offering the offers medical dental vision life insurance disability accidental death and dismemberment tax-preferred savings accounts and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment along with 10 sick days (also prorated) and paid holidays. For more details on Truists generous benefit plans please visit our Benefits site. Depending on the position and division this job may also be eligible for Truists defined benefit pension plan restricted stock units and/or a deferred compensation plan. As you advance through the hiring process you will also learn more about the specific benefits available for any non-temporary position for which you apply based on full-time or part-time status position and division of work.

Truist is an Equal Opportunity Employer that does not discriminate on the basis of race gender color religion citizenship or national origin age sexual orientation gender identity disability veteran status or other classification protected by law. Truist is a Drug Free Workplace.

EEO is the LawPay Transparency Nondiscrimination Provision E-Verify


Required Experience:

Senior IC

Employment Type

Full-Time

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.