Listing Description
Fortra has an exciting opportunity on the Corporate Security team for a Sr. Threat Hunter. This role will focus on identifying novel threats impacting Fortra and devising strategies to improve Fortra’s ability to quickly detect similar activity in the future and hunt for past activity. Professionals who have both strong technical skills and an analytic mindset will relish the challenge of discovering new ways to reliably pinpoint and eliminate adversary activity impacting Fortra and organizations across the world. Working as part of a team, you will operate alongside Data Science, Security Analysts, Threat Intelligence, Security Engineering and other functions within Fortra that share the mission of keeping Fortra safe from cyber threats.
WHAT YOU'LL DO
- Actively research various types of cyber-attacks using active defense techniques, data analysis, and open-source intelligence gathering
- Conduct data analysis to identify notable cyber-criminal and APT trends
- Cultivate relationships with external law enforcement and partner entities
- Knowledge of various types of cyber threats, threat groups, attack vectors, attacker tactics, and countermeasures
- Analyze threat actor communications to understand new tactics, techniques, and procedures (TTPs)
- Using triggers such as external threat indicators, current world events, or novel TTPs, devise strategies to identify previously undetected malicious activity
QUALIFICATIONS
- Outstanding data analysis skills and experience with data analysis tools
- Strong analytical reasoning, problem solving, and decision-making skills
- Ability to work independently and effectively as part of a remote team with minimal supervision
- Passion for helping solve big problems and working with a wide variety of teams to make an impact
- Clear and concise communication skills (verbal and written)
- A detail-oriented and analytic mindset
- Former experience in the intelligence community or cyber security industry in an analytical role
- Experience with APIs and/or basic scripting languages
- Experience performing network forensics, analyzing PCAP data and strong understanding of networking protocols
- Experience capturing and analyzing digital forensics for various devices and operating systems
- Experience managing a SIEM, consuming and integrating multiple threat intelligence feeds into corporate security products
- Experience with OSINT, dark web and other sources of cyber-crime and APT related threat intelligence
- Ability to quickly digest raw intelligence and perform threat hunts based on intel
- Comfortable working with highly complex, globally connected hybrid information systems that incorporates multiple co-los, on-premise and cloud assets
Listing Details
- Citizenship: Not Provided
- Incentives: Not Provided
- Education: Not Provided
- Travel: Not Provided
- Telework: Not Provided