What are the responsibilities and job description for the Analyst, Cyber Threat Hunting position at Venusgeo?
Job Details
Job Title:
Analyst, Cyber Threat Hunting |
Location: Fort Worth, TX
The Threat Intelligence and Response Analyst must be an adaptable team-player who loves to collaborate with others. You must be familiar with threat hunting operations and possess the technical problem-solving skills that enable American airlines to proactively prevent breaches. Communication skills are critical to this role s success.
For this position, we re looking for someone to work hybrid with occasional on-call duties.
What You'll Need:
Bachelor s degree in Cybersecurity, Information Technology, Computer Science or a related field; advanced degree preferred.
4 years of experience in the cybersecurity industry, with demonstrated roles in SOC, Incident Response, Threat Intelligence, Malware Analysis, IDS/IPS Analysis, or related functions.
Proven ability to independently investigate and analyze alerts for anomalous, suspicious, or malicious activity in a corporate environment and support remediation efforts.
Experience conducting proactive threat hunts, including developing custom search criteria and identifying intrusions or potential incidents.
Strong understanding of cyber adversarial tactics, techniques, and procedures (TTPs) related to Cyber Crime, Malware, Botnets, Hacktivism, Social Engineering, APTs, and Insider Threats.
Proficient in Endpoint Detection and Response (EDR) tools and capabilities, with hands-on experience using CrowdStrike, Microsoft Defender, and other major vendors.
Foundational knowledge of Digital Forensics and Incident Response (DFIR) processes.
Experience with large dataset analysis and log analysis tools, including Securonix, Snowflake, Python, Pandas, and SQL.
Skilled in using Regular Expressions, YARA, SIGMA rules, FQL, KQL, and at least one scripting language such as Python, PowerShell, or PERL.
Strong understanding of cyber adversarial frameworks like MITRE ATT&CK and Lockheed Martin s Cyber Kill Chain.
Hands-on experience hunting for Indicators of Compromise (IOCs) in SIEM and EDR tools such as Securonix, Microsoft Defender, Microsoft Purview, Microsoft Sentinel, Palo Alto XSOAR, ThreatConnect, and Recorded Future.
Excellent written and verbal communication skills with the ability to explain technical threat hunt objectives and findings to both technical and non-technical audiences, effectively communicating associated risks.
Certifications such as Network , Security , CISSP, CISM, GCIH, GCFA, and/or cloud-specific certifications like AWS Cloud Practitioner, AWS Certified Security - Specialty, and Microsoft Certified: Azure Security Engineer Associate.
Comment: The candidate will be required to follow the hybrid requirement and the interview process will be two rounds; first virtual and second onsite. Top 5 skills below: Investigate and analyze alerts Utilize advanced threat hunting techniques and tools Support threat response efforts 4 years of experience in the cybersecurity industry Excellent written and verbal communication skills
Thanks
Govardhan
Your Trusted Digital Technology Partner
Email: