Logo
Base One Technologies

Threat Hunt Analyst Mid

Base One Technologies, Ashburn, Virginia, United States, 22011

Save Job

Responsibilities: Create Threat Models to better understand the agency IT Enterprise, identify defensive gaps, and prioritize mitigations. Author, update, and maintain SOPs, playbooks, and work instructions. Utilize Threat Intelligence and Threat Models to create threat hypotheses. Plan and scope Threat Hunt Missions to verify threat hypotheses. Proactively and iteratively search through systems and networks to detect advanced threats. Analyze host, network, and application logs in addition to malware and code. Prepare and report risk analysis and threat findings to appropriate stakeholders. Create, recommend, and assist with the development of new security content as a result of hunt missions, including signatures, alerts, workflows, and automation. Coordinate with different teams to improve threat detection, response, and enhance the overall security posture of the Enterprise. Basic Qualifications: Positions at this career level typically require a BS degree or equivalent and 2-4 years of prior relevant experience, or a masters with less than 2 years, in order to operate within the scope contemplated by the level. The candidate must currently possess a Top Secret Clearance. Experience in the areas of incident detection and response, malware analysis, or computer forensics. Required Education/Experience: BS degree or equivalent and 2-4 years of prior relevant experience, or a masters with less than 2 years, in order to operate within the scope contemplated by the level. Required Certifications (One or two of the following): CCNA Security CCNP Security CEH Certified Ethical Hacker CHFI Computer Hacking Forensic Investigator CISSP Certified Information Systems Security CIRC ECSA EC-Council Certified Security Analyst ECSS EC-Council Certified Security Specialist EnCE ENSA EC-Council Network Security Administrator FIWE GCFA Forensic Analyst GCFE Forensic Examiner GISF Security Fundamentals GNFA Network Forensic Analyst GXPN Exploit Researcher and Advanced Penetration Tester LPT Licensed Penetration Tester OSCE (Certified Expert) OSCP (Certified Professional) OSWP (Wireless Professional) WFE-E-CI FTK-WFE-FTK CompTIA Cyber Security Analyst (CySA+) Splunk Core Certified Advanced Power User Splunk Core Certified Consultant Splunk SOAR Certified Automation Developer IACRB Certified Security Awareness Practitioner (CSAP) Preferred Qualifications: Expertise in network and host-based analysis and investigation. Demonstrated experience planning and executing threat hunt missions. Understanding of complex Enterprise networks, including routing, switching, firewalls, proxies, and load balancers. Working knowledge of common networking protocols (HTTP, DNS, SMB, etc). Familiarity with the operation of both Windows and Linux-based systems. Proficient with scripting languages such as Python or PowerShell. Familiarity with Splunk Search Processing Language (SPL) and/or Elastic Domain Specific Language (DSL). Demonstrated experience triaging and responding to APT activities. Experience working with various technologies and platforms such as AWS, Azure, O365, containers, etc. Understanding of the current cyber threat landscape, the different tactics commonly used by adversaries, and how to investigate, contain, and recover from their attacks.

#J-18808-Ljbffr