What are the responsibilities and job description for the Threat Hunting Consultant position at Triune Infomatics?
Role: Threat Hunting Consultant
Location: Oakland, CA/Remote
Duration: 6 Months
Overview: The Threat Hunting Consultant proactively identifies, analyzes, and mitigates cyber threats that bypass traditional security controls. This role involves leveraging advanced threat intelligence, forensic analysis, and behavioral analytics to detect and counter sophisticated attacks.
Key Responsibilities:
Conduct proactive threat hunting across networks, endpoints, and cloud environments.
Utilize SIEM, EDR, and NDR tools to analyze suspicious activities and uncover threats.
Investigate security incidents, perform forensic analysis, and identify detection gaps.
Integrate internal/external threat intelligence to enhance security operations.
Collaborate with incident response teams and provide detailed reports on findings.
Develop automation playbooks, improve detection mechanisms, and train teams.
Qualifications:
Experience: 3-5 years in cybersecurity, threat hunting, digital forensics, or incident response.
Education: Bachelor's in Cybersecurity, Computer Science, or related field (or equivalent experience).
Technical Skills:
Strong knowledge of MITRE Telecommunication&CK, adversary TTPs, and forensic tools (Splunk, CrowdStrike, Velociraptor).
Proficiency in scripting ( Python, PowerShell, Bash ) for automation.
Familiarity with network security, cloud security ( AWS, Azure, GCP ), and containerized environments.
Preferred Certifications:
GCIH, GTH, CEH, CISSP, or OSCP.
Soft Skills:
Strong analytical, problem-solving, and communication skills.
Ability to work independently and collaboratively.
Location: Oakland, CA/Remote
Duration: 6 Months
Overview: The Threat Hunting Consultant proactively identifies, analyzes, and mitigates cyber threats that bypass traditional security controls. This role involves leveraging advanced threat intelligence, forensic analysis, and behavioral analytics to detect and counter sophisticated attacks.
Key Responsibilities:
Conduct proactive threat hunting across networks, endpoints, and cloud environments.
Utilize SIEM, EDR, and NDR tools to analyze suspicious activities and uncover threats.
Investigate security incidents, perform forensic analysis, and identify detection gaps.
Integrate internal/external threat intelligence to enhance security operations.
Collaborate with incident response teams and provide detailed reports on findings.
Develop automation playbooks, improve detection mechanisms, and train teams.
Qualifications:
Experience: 3-5 years in cybersecurity, threat hunting, digital forensics, or incident response.
Education: Bachelor's in Cybersecurity, Computer Science, or related field (or equivalent experience).
Technical Skills:
Strong knowledge of MITRE Telecommunication&CK, adversary TTPs, and forensic tools (Splunk, CrowdStrike, Velociraptor).
Proficiency in scripting ( Python, PowerShell, Bash ) for automation.
Familiarity with network security, cloud security ( AWS, Azure, GCP ), and containerized environments.
Preferred Certifications:
GCIH, GTH, CEH, CISSP, or OSCP.
Soft Skills:
Strong analytical, problem-solving, and communication skills.
Ability to work independently and collaboratively.