What are the responsibilities and job description for the Cyber Hunt Threat Analyst (CHTA Team) position at Core4ce?
Information Technology --> Cyber
Hanahan, SC
ID: Cyber Hunt Threat Analyst (CHTA Team)
Full-Time/Regular
As a Threat Detection Specialist you will be a part of the NIWC Cybersecurity Service Provider (CSSP) Operations Threat Detection Team (CHTA Team) and an SME in both network and host-based security tools with associated tools providing data enrichment, orchestration, and automated response. The CHTA Team works closely with the Cyber Threat Intelligence team to coordinate ingestion of near-real-time threat intelligence data into the workflow ensuring rapid analysis, creation of indicator logic, and the conduction of cyber threat hunting missions based off adversarial Technique, Tactics, and Procedures (TTPs).
Position Responsibilities And Duties
Minimum Top Secret required with upgrade eligibility to TS/SCI
Hanahan, SC
ID: Cyber Hunt Threat Analyst (CHTA Team)
Full-Time/Regular
As a Threat Detection Specialist you will be a part of the NIWC Cybersecurity Service Provider (CSSP) Operations Threat Detection Team (CHTA Team) and an SME in both network and host-based security tools with associated tools providing data enrichment, orchestration, and automated response. The CHTA Team works closely with the Cyber Threat Intelligence team to coordinate ingestion of near-real-time threat intelligence data into the workflow ensuring rapid analysis, creation of indicator logic, and the conduction of cyber threat hunting missions based off adversarial Technique, Tactics, and Procedures (TTPs).
Position Responsibilities And Duties
- Maintains knowledge on the current cyber threat landscape
- Creates, updates, and maintains indicator logic using all CSSP tools and resources
- Provides relevant and useful alerts for the Operations Watch team
- US Citizen
- At least 3 years of experience with IDS/IPS Solutions
- At least 3 years of experience performing analysis or threat hunting with Windows Event logs, Sysmon, and/or Linux logs
- At least 3 years' experience in Cybersecurity Service Provider (CSSP) environment or similar
- Up to 15% global travel may be required; emergency travel may be required with 72-hour notice.
Minimum Top Secret required with upgrade eligibility to TS/SCI
- Knowledge of CJCSM 6510.01B
- Knowledge of the MITRE Att&ck Framework
- Offensive Threat Emulation Experience (Red Team)
- Experience with building detections within a SIEM/SOAR or IDS/IPS solution
- Experience with static Malware Analysis
- DoD 8570 Classification IAT –II & CSSP Incident Responder or Analyst Category certification