The Johns Hopkins University Applied Physics Laboratory - Laurel, MD
posted 4 months ago
As a Cybersecurity Hunt Analyst at APL, you will be an integral part of a highly collaborative Cybersecurity Research & Hunt Team. Your role will involve tracking advanced cyber threats and analyzing data to identify malicious behaviors in a constantly evolving threat landscape. You will perform real-time incident handling, independently following and creating procedures to analyze and contain malicious activity. This includes collecting evidence such as digital media, logs, and malware to perform thorough analyses associated with cyber intrusions. You will maintain a deep understanding of attack methodologies and utilize this knowledge operationally to make informed recommendations and modifications to processes and procedures based on advanced threat behaviors. In this position, you will actively hunt for sophisticated cyber threats by analyzing data and identifying malicious behaviors. You will engage collaboratively with peers to build a comprehensive response to cyber incidents, collecting evidence across multiple platforms and analyzing malware related to cyber intrusions. Keeping current with threat intelligence and adversarial behaviors will be crucial for operational effectiveness. You will also be responsible for developing and enhancing content and methodologies for hunting, monitoring, and responding to incidents across various platforms, including on-premises, SaaS, and IaaS environments. This role requires maturing processes, workflows, and documentation while determining high-fidelity behavioral patterns and crafting content in multiple tools. Additionally, you will participate in project and multi-functional security teams, interacting with system administrators, cloud engineers, IAM administrators, networking staff, application developers, IT operations staff, and cyber research and development areas within the organization. Your contributions will help identify and implement information assurance controls and risk mitigations for IT operations, and you will provide routine reporting on goals and objectives to management.