Verizon Communications - Irving, TX

posted 3 months ago

Full-time - Mid Level
Remote - Irving, TX
10,001+ employees
Telecommunications

About the position

The Threat Hunter role at Verizon is a critical position within the Threat Management Center (TMC), responsible for safeguarding the company's networks and information systems against cyber threats and internal misconduct. This role involves proactive threat hunting, incident response, and digital forensics, requiring a blend of strategic and tactical skills to navigate the evolving threat landscape. The individual will work collaboratively in a fast-paced environment to identify, neutralize, and mitigate potential threats, ensuring continuous operations and protecting Verizon's brand reputation.

Responsibilities

  • Performing day-to-day operations as a trusted advisor on advanced threat hunting for the team.
  • Leading 'hunt missions' using threat intelligence and data from multiple sources to discover evidence of threats or anomalous behavior.
  • Utilizing advanced threat hunting techniques and tools to detect, analyze, and respond to anomalous activities.
  • Identifying threat actor groups and characterizing suspicious behaviors, developing network and host-based IOCs or IOAs.
  • Finding evidence of threats or suspicious behavior and leveraging data to improve controls and processes.
  • Evaluating and making recommendations on security tools and technologies needed to analyze potential threats.
  • Ensuring gaps in detections are communicated with Cyber Security stakeholders and collaborating to mitigate threats.
  • Reviewing outcomes of incident lessons learned and root cause analysis to ensure sustainable processes are established.
  • Acting as a subject matter expert in internal and external audit reviews, producing and presenting artifacts and executive summaries.
  • Participating in Purple Team, Threat Hunt, and tabletop exercises.
  • Working closely with key cross-functional stakeholders to develop proactive measures to prevent, detect, and respond to potential threats.
  • Presenting executive-level operational read-outs, metrics, and case reviews to senior executives, including the Chief Information Security Officer.
  • Developing and executing long-term and short-term strategic goals and ensuring proper updates are communicated to stakeholders.
  • Mentoring and advising team members on advanced techniques to drive operational and strategic growth.

Requirements

  • Bachelor's degree or six or more years of work experience.
  • Four or more years of experience in cybersecurity, focusing on threat hunting, cloud security, and incident response.

Nice-to-haves

  • Demonstrated experience as a key member of a security operations team (SOC, Incident Response, Threat Intel, etc.).
  • Comprehensive knowledge utilizing system, cloud, application, and network logs.
  • High-level understanding of Operating Systems: Windows, Unix/Linux, and OSX.
  • Proficient knowledge of the cyber threat landscape including types of adversaries and their motivations.
  • Experience with analysis techniques, identifying indicators of compromise, and threat hunting.
  • Fundamental understanding of tactics, technologies, and procedures related to Cyber Crime and Malware.
  • Knowledgeable with Regular Expressions, YARA and SIGMA rules, and at least one common scripting language (PERL, Python, PowerShell).
  • Strong understanding of cyber-based adversarial frameworks including MITRE ATT&CK.

Benefits

  • Hybrid work environment with defined work location and remote work options.
  • Minimum eight assigned office days per month.
  • Equal Employment Opportunity and commitment to diversity and inclusion.
Job Description Matching

Match and compare your resume to any job description

Start Matching
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service