Threat Hunter (SOC) : Bridgewater NJ -Contract-Persistent at Bridgewater, New York, USA |
Email: [email protected] |
Hi, Greetings from EIT Professionals, Job Title: Threat Hunter (SOC) Location : Bridgewater NJ Hire type : Contract. Job Description: Overview: A Threat Hunter is a skilled cybersecurity specialist dedicated to actively seeking out and identifying security threats, vulnerabilities, and potential risks within an organization's IT environment. This role involves using a combination of cybersecurity tools, techniques, and expertise to detect and respond to advanced threats. Qualifications: Bachelor's degree in a related field (e.g., Information Security, Computer Science) or equivalent work experience. 8-12 years of experience in cybersecurity, including experience in incident response, security analysis, or penetration testing. Proficiency in using threat hunting tools and techniques. Strong knowledge of cybersecurity principles, threat actors, and attack vectors. Familiarity with various operating systems, network protocols, and security technologies. Excellent analytical and problem-solving skills. Relevant certifications such as Certified Threat Intelligence Analyst (CTIA), Certified Incident Handler (GCIH), or Certified Information Systems Security Professional (CISSP) may be advantageous. Key Responsibilities: Threat Identification and Analysis: Proactively search for signs of malicious activities, anomalies, and indicators of compromise (IOCs) within the network and systems. Conduct in-depth analysis of network traffic, logs, and security data to uncover hidden threats and vulnerabilities. Incident Detection and Response: Detect, investigate, and respond to security incidents in a timely and effective manner. Collaborate with incident response teams to contain and mitigate identified threats. Threat Intelligence Integration: Stay up-to-date with the latest threat intelligence feeds, trends, and emerging threats. Incorporate threat intelligence into the threat hunting process to enhance detection capabilities. Tool and Technology Utilization: Utilize a variety of cybersecurity tools, including SIEM (Security Information and Event Management) systems, EDR (Endpoint Detection and Response) solutions, network traffic analysis tools, and threat hunting platforms. Develop and maintain custom scripts or tools for threat hunting activities. Continuous Monitoring: Implement continuous monitoring processes to ensure ongoing threat detection and response. Create and manage alerts and alarms based on hunting findings and threat intelligence. Reporting and Documentation: Document findings, investigation details, and remediation actions taken. Generate reports and provide insights to stakeholders and leadership on the threat landscape and potential risks. Collaboration and Training: Collaborate with other cybersecurity professionals, including SOC (Security Operations Center) analysts and incident responders. Provide guidance and training to security teams on threat hunting techniques and best practices. Thanks & Regards Logesh | E-IT Professionals Corp. 17199 N Laurel Park Dr. Ste 402, Livonia, MI 48152 Email | [email protected] Keywords: information technology Michigan New Jersey |
[email protected] View all |
Mon Feb 05 23:21:00 UTC 2024 |