Column Technical Services is seeking a driven and technically adept Senior Operations Engineerto strengthen its Information Security program in NY NY. This individual will play a key role in uncovering sophisticated threats leading investigative efforts and enhancing detection capabilities across a large complex enterprise. A strong foundation in systems engineering security operations and offensive/defensive security methodologies is essential as the role requires immediate contribution to threat hunting detection engineering and incident response initiatives. If youre a Threat Hunting Engineer driven by curiosity energized by challenging adversaries and eager to make a measurable difference in a missioncritical environment this is the place where your expertise can make a real impact. Submit your application and lets begin the conversation.
Candidates must reside in NY NJ PA or CT for a hybrid schedule with remote flexibility.
Please note that sponsorship is not available for this position.
Core Responsibilities
- Perform continuous proactive threat hunting across onpremise cloud and networked environments.
- Create test and refine hypotheses informed by threat intelligence adversary tradecraft and evolving attack patterns (MITRE ATT&CK).
- Examine extensive log endpoint and network telemetry to uncover anomalies or indicators of malicious activity.
- Develop and maintain custom detections scripts and automated workflows to enhance hunting speed and accuracy.
- Partner closely with SOC analysts red team members and incident responders to validate discoveries and remediate detection blind spots.
- Improve visibility and resilience by engineering enhancements to logging pipelines telemetry sources and security tools.
- Document findings produce posthunt reports and contribute to internal knowledge sharing and process improvement.
Required Qualifications
- 5-7 years of experience in at least two of the following areas:
*SOC operations and incident response
*Red or Blue Team engagement
*Penetration testing
*Incident response activities
- Bachelors degree in Information Security Computer Science or a related discipline.
- Strong understanding of attacker behaviors TTPs and the MITRE ATT&CK framework.
- Solid background in systems or network engineering including hardening and securing Windows Linux and cloud environments.
- Handson experience reviewing logs packet captures or endpoint data to identify compromise indicators.
- Proficiency in at least one scripting or programming language (Python PowerShell Bash etc.).
- Demonstrated analytical thinking problemsolving ability and a proactive approach to investigation.
Preferred Qualifications
- Experience working with SIEM EDR or threat intelligence platforms.
- Knowledge of cloud security principles and technologies (Azure AWS etc.).
- Prior involvement in building detection logic or authoring threat hunting playbooks.
- Relevant security certifications such as eCTHP OSCP CCTHP GCFA CISSP or similar.
Required Experience:
Senior IC
Column Technical Services is seeking a driven and technically adept Senior Operations Engineerto strengthen its Information Security program in NY NY. This individual will play a key role in uncovering sophisticated threats leading investigative efforts and enhancing detection capabilities across a ...
Column Technical Services is seeking a driven and technically adept Senior Operations Engineerto strengthen its Information Security program in NY NY. This individual will play a key role in uncovering sophisticated threats leading investigative efforts and enhancing detection capabilities across a large complex enterprise. A strong foundation in systems engineering security operations and offensive/defensive security methodologies is essential as the role requires immediate contribution to threat hunting detection engineering and incident response initiatives. If youre a Threat Hunting Engineer driven by curiosity energized by challenging adversaries and eager to make a measurable difference in a missioncritical environment this is the place where your expertise can make a real impact. Submit your application and lets begin the conversation.
Candidates must reside in NY NJ PA or CT for a hybrid schedule with remote flexibility.
Please note that sponsorship is not available for this position.
Core Responsibilities
- Perform continuous proactive threat hunting across onpremise cloud and networked environments.
- Create test and refine hypotheses informed by threat intelligence adversary tradecraft and evolving attack patterns (MITRE ATT&CK).
- Examine extensive log endpoint and network telemetry to uncover anomalies or indicators of malicious activity.
- Develop and maintain custom detections scripts and automated workflows to enhance hunting speed and accuracy.
- Partner closely with SOC analysts red team members and incident responders to validate discoveries and remediate detection blind spots.
- Improve visibility and resilience by engineering enhancements to logging pipelines telemetry sources and security tools.
- Document findings produce posthunt reports and contribute to internal knowledge sharing and process improvement.
Required Qualifications
- 5-7 years of experience in at least two of the following areas:
*SOC operations and incident response
*Red or Blue Team engagement
*Penetration testing
*Incident response activities
- Bachelors degree in Information Security Computer Science or a related discipline.
- Strong understanding of attacker behaviors TTPs and the MITRE ATT&CK framework.
- Solid background in systems or network engineering including hardening and securing Windows Linux and cloud environments.
- Handson experience reviewing logs packet captures or endpoint data to identify compromise indicators.
- Proficiency in at least one scripting or programming language (Python PowerShell Bash etc.).
- Demonstrated analytical thinking problemsolving ability and a proactive approach to investigation.
Preferred Qualifications
- Experience working with SIEM EDR or threat intelligence platforms.
- Knowledge of cloud security principles and technologies (Azure AWS etc.).
- Prior involvement in building detection logic or authoring threat hunting playbooks.
- Relevant security certifications such as eCTHP OSCP CCTHP GCFA CISSP or similar.
Required Experience:
Senior IC
View more
View less