Listing Description
PepsiCo (Pepsi, Frito-Lay, Quaker, Tropicana, Gatorade) is a Fortune 50 global company with nearly 300,000 employees in over 200 countries. We are one of the most admired and respected companies in the world according to Barron's and Fortune plus LinkedIn ranks us in the top 15 on their Global Top Attractors list. PepsiCo is seeking to hire a Threat Hunter that will be a key member of the PepsiCo Cyber Fusion Center (CFC) responsible for participating in threat actor based investigations.
The Threat Hunter will be a key member of the PepsiCo Cyber Fusion Center (CFC) responsible for participating in threat actor based investigations, creating new detection methodology and providing expert support to incident response and monitoring functions. The focus of the Threat Hunter is to detect, disrupt and eradicate threat actors from enterprise networks. To execute this mission, the Threat Hunter will use data analysis, threat intelligence, and cutting-edge security technologies.
Need another reason to join PepsiCo?
You would get access to our PepsiCo 18 hole competition disc golf course and mountain biking / hiking trails at our 265 acre Frito-Lay campus that is a five minute drive in Plano, TX. We also have a company subsidized workout gym (with laundry!), full soccer field, softball diamond, volleyball pits and tennis courts. Toss out the business clothes because threat hunting is a jeans kind of gig. Pepsi products on tap (yes, Mountain Dew) and free for you...Hunt for and identify threat actor groups and their techniques, tools and processes.
Participate in "hunt missions" using threat intelligence, analysis of anomalous log data and results of brainstorming sessions to detect and eradicate threat actors on the PepsiCo network.
Provide expert analytic investigative support of large scale and complex security incidents.
Perform analysis of security incidents for further enhancement of alert catalog
Continuously improve processes for use across multiple detection sets for more efficient CFC operations.
Document best practices with the CFC staff using available collaboration tools and work spaces.
Review alerts generated by detection infrastructure for false positive alerts and modify alerts as needed.
Develop dashboards and reports to identify potential threats, suspicious/anomalous activity, malware, etc.
Provide forensic analysis of network packet captures, DNS, proxy, Netflow, malware, host-based security and application logs, as well as logs from various types of security sensors.
A passion for research, and uncovering the unknown about cyber security threats and threat actors.
Listing Details
- Citizenship: No Requirements
- Incentives: Bonus
- Education: No Requirements
- Travel: Travel 25
- Telework: Optional Telecommute