Home

Threat Hunter (SOC) : Bridgewater NJ -Contract-Persistent at Bridgewater, New York, USA
Email: [email protected]
Hi,

Greetings from
EIT Professionals,

Job Title:

Threat Hunter

 (SOC)

Location : Bridgewater NJ

Hire type : Contract.

Job Description:

Overview:

A Threat Hunter is a skilled cybersecurity specialist dedicated to actively seeking out and identifying security threats, vulnerabilities, and potential risks within an organization's IT
environment. This role involves using a combination of cybersecurity tools, techniques, and expertise to detect and respond to advanced threats.

Qualifications:

Bachelor's degree in a related field (e.g., Information Security, Computer Science) or equivalent work experience.

8-12 years of experience in cybersecurity, including experience in incident response, security analysis, or penetration testing.

Proficiency in using threat hunting tools and techniques.

Strong knowledge of cybersecurity principles, threat actors, and attack vectors.

Familiarity with various operating systems, network protocols, and security technologies.

Excellent analytical and problem-solving skills.

Relevant certifications such as Certified Threat Intelligence Analyst (CTIA), Certified Incident Handler (GCIH), or Certified Information Systems Security Professional (CISSP) may be advantageous.

Key Responsibilities:

Threat Identification and Analysis:

Proactively search for signs of malicious activities, anomalies, and indicators of compromise (IOCs) within the network and systems.

Conduct in-depth analysis of network traffic, logs, and security data to uncover hidden threats and vulnerabilities.

Incident Detection and Response:

Detect, investigate, and respond to security incidents in a timely and effective manner.

Collaborate with incident response teams to contain and mitigate identified threats.

Threat Intelligence Integration:

Stay up-to-date with the latest threat intelligence feeds, trends, and emerging threats.

Incorporate threat intelligence into the threat hunting process to enhance detection capabilities.

Tool and Technology Utilization:

Utilize a variety of cybersecurity tools, including SIEM (Security Information and Event Management) systems, EDR (Endpoint Detection and Response) solutions, network traffic analysis tools,
and threat hunting platforms.

Develop and maintain custom scripts or tools for threat hunting activities.

Continuous Monitoring:

Implement continuous monitoring processes to ensure ongoing threat detection and response.

Create and manage alerts and alarms based on hunting findings and threat intelligence.

Reporting and Documentation:

Document findings, investigation details, and remediation actions taken.

Generate reports and provide insights to stakeholders and leadership on the threat landscape and potential risks.

Collaboration and Training:

Collaborate with other cybersecurity professionals, including SOC (Security Operations Center) analysts and incident responders.

Provide guidance and training to security teams on threat hunting techniques and best practices.

Thanks & Regards

Logesh
 | E-IT Professionals Corp.

17199 N Laurel Park Dr. Ste 402, Livonia, MI 48152

Email | 
[email protected]

Keywords: information technology Michigan New Jersey
[email protected]
View all
Mon Feb 05 23:21:00 UTC 2024

To remove this job post send "job_kill 1085840" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 40

Location: , New Jersey