Listing Description
This is a principal or senior-level position. This is not an entry-level position for inexperienced analysts or those seeking to transition hunting. Prior hunting experience against advanced and persistent threats is a requirement.
- Experience with industrial control systems and threats specific to their operational environment
- Experience reverse engineering malware with static and/or dynamic tools and techniques
- Experience developing YARA, snort, and/or Bro signatures
-Experience working with an operations center and/or incident response team
- Experience pivoting across the Diamond Model, all stages of the Kill Chain, and ATT&CK
- Experience developing indicators of compromise (IOCs) for customer-facing applications5+ years’ hunting and tracking targeted threats
5+ years’ experience with network-based intrusion analysis
Knowledge of common malware functionality and operations and comfortable working with static and dynamic binary analysis output
5+ years developing analytics to enable threat hunting and detection
Demonstrable experience producing customer-facing intelligence reports with strong writing skills
1+ year working directly with customers to collect requirements and feedback on intelligence products and services
Able to work well with a remote team of collaborators and deliver product on time and within quality guidelines
Comfortable in at least one scripting language (like Python) enabling the analyst to automate their own tasks when necessary
Good research and documentation skills including knowledge of major OSINT sources and their investigatory value
Listing Details
- Salary: $170000 - $200000
- Citizenship: No Requirements
- Incentives: Both
- Education: No Requirements
- Travel: No Travel
- Telework: Full Telecommute