We are seeking a Security Analyst Incident Response & Threat Intelligence to support threat hunting threat intelligence incident response and exposure-focused analysis within the GTS Security & Compliance team.
This role works closely with Senior Analysts and security leadership contributing to investigations security operations and proactive analysis across a global enterprise environment.
Key Responsibilities
Support proactive threat hunting threat intelligence and incident response activities in collaboration with Senior Analysts
Execute hypothesis-driven threat hunts and investigative analysis across endpoint identity cloud and network telemetry
Assist in assessing investigating and responding to high-priority security events under the guidance of senior analysts and management
Analyze adversary behavior using MITRE ATT&CK and current realworld threat activity
Partner with Vulnerability Management to apply threat intelligence to vulnerability prioritization risk assessment and remediation efforts
Contribute to exposure management by identifying misconfigurations attack paths and chained weaknesses across the environment
Help translate intelligence findings hunt results and exposure insights into actionable detection and response recommendations
Collaborate with SOC Privacy Legal Compliance IT Vulnerability Management and business stakeholders during investigations
Produce clear well-structured documentation and investigation summaries for leadership and incident records
Skills:
3 years of experience in Threat Intelligence Threat Hunting or Incident Response roles
Demonstrated experience supporting investigations and proactive security analysis within enterprise environments
Strong hands-on experience with EDR platforms and SIEM / log analytics tools
Solid understanding of vulnerability exploitation exposure management and attack path analysis
Strong knowledge of adversary tradecraft attacker behavior and modern intrusion techniques
Ability to operate independently think critically and make sound decisions under pressure while collaborating with senior analysts
Strong written and verbal communication skills with the ability to clearly document findings and explain technical issues to varied audiences
No direct people management responsibilities
May provide technical guidance and informal mentorship to peers during investigations as appropriate
Education:
Bachelors degree in Cybersecurity Computer Science or a related field or equivalent practical experience
3 years of hands-on experience in Threat Intelligence Threat Hunting or Incident Response may substitute for formal education
Industry certifications are preferred but not required including: o GIAC (GCIA GCIH GCED GCIR GNFA GCFA) o Offensive Security (OSCP OSCE) o Red Team / Adversary Emulation (CRTO CRTP CRTA) o Digital Forensics & Incident Response (GCFA GNFA CFCE EnCE)
At Infotree, meeting your career needs is a top priority. Client satisfaction is largely dependent on the resources we can provide, and we take pride in our delivery. We have a supportive team in place to give quality people a chance to grow and challenge themselves in their roles whi ... View more