This job is closed

We regret to inform you that the job you were interested in has been closed. Although this specific position is no longer available, we encourage you to continue exploring other opportunities on our job board.

Cyberspace Threat-Hunter

$112,000 - $179,000/Yr

Peraton

posted 3 months ago

Full-time - Mid Level
Computing Infrastructure Providers, Data Processing, Web Hosting, and Related Services

About the position

The Cyber Threat Hunter position at Peraton involves supporting the Active Defense Team in analyzing and interpreting cyber incident reports and intelligence to understand malicious cyber activity. The role requires developing analytics and correlation rulesets to identify adversaries' behaviors and enhancing the threat hunting process through sophisticated data models. The position also involves maintaining knowledge management solutions and utilizing advanced data visualization techniques to communicate cybersecurity insights effectively.

Responsibilities

  • Analyze and interpret cyber incident reports and intelligence to understand malicious cyber activity.
  • Develop SIEM-based analytics and correlation rulesets to identify adversaries' behaviors, goals, and methods.
  • Develop sophisticated data models to streamline the threat hunting process and enhance data processing efficiency.
  • Maintain and update knowledge management solutions, including Microsoft Power Platform applications and SharePoint portals.
  • Utilize advanced data visualization techniques to present complex data sets and communicate cybersecurity insights to non-technical audiences.

Requirements

  • Minimum of 8 years of experience with a BS/BA, 6 years with MS/MA, or 3 years with PhD; HS+12 years of experience considered.
  • DoD 8570 "IAT Level II" and "CSSP Analyst" certification required at start of employment.
  • Active TS/SCI w/Poly and ability to obtain MEAD.
  • U.S. Citizen.

Nice-to-haves

  • In-depth knowledge of cyberspace threat frameworks, such as MITRE ATT&CK® Enterprise.
  • Ability to understand and interpret intelligence data at an expert level for hypothesis-driven cyber threat hunt activities.
  • In-depth knowledge of host and network-based logging and the ability to analyze and interpret log data.
  • Fluency in reading/writing SIEM-based analytics using languages such as Kusto Query Language, Kibana Query Language, Structured Query Language, and Lucene.
  • Ability to read and write programming/scripting languages such as Python, PowerShell, BASH, and Visual Basic.
  • Experience with low-code automation platforms such as Power Automate and Power Apps.

Benefits

  • Dental insurance
  • Disability insurance
  • Health insurance
  • Paid holidays
  • Paid parental leave
  • Paid time off
  • Tuition assistance
  • Fertility treatment
  • Life & Disability Insurance
  • Career Development
Job Description Matching

Match and compare your resume to any job description

Start Matching
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service