To Learn & know more about Threat Intelligence visit our website – FirstHackersNews

Threat Hunters

Work With Us!

Job Description:

We are looking for proactive enthusiastic candidates to join our existing SOC Team which is a complete WFH Model. We are 24*7* 365 SOC Team, handles various clients across the globe and we are exploring the candidates with below qualifications to fulfill our current positions.

  • Threat Hunter is responsible to create and perform proactive, iterative, and repeatable searches on enterprise customer environments to detect malicious, suspicious, or risky activities or novel attack techniques that have evaded detection by existing tools.
  • Must have strong communication skills to collaborate and produce reports based on threat hunting results that can be presented to internal and/or external stakeholders.
  • Must work with internal teams to recommend/develop new or custom security content incorporating signatures, alerts, workflows and automation to combat potential threats and enable future hunts
  • Expertise in SIEM, network, and/or host-based analysis and discovery is required, including query languages ​​common in SIEM products.
  • Continuous research into cyber threats, vulnerabilities, newly released indicators, adversary tactics, techniques, and procedures to stay up-to-date with the threat landscape and use this knowledge to develop methodologies and playbooks.
  • Experience with threat intelligence-driven or hypothesis-based threat hunting, various cybersecurity and intelligence frameworks is required to identify missing or ineffective detection capabilities
  • Ability to correlate activity across multiple reporting sources and large datasets.

KEY REQUIREMENTS (Education, Work Experience & Skills)

  • 3 years – Experience in Information Security required.
  • 1 year – Experience with information technology concepts, terminology, and standards required.
  • Understanding of Security Methodologies Windows / Linux / Unix operating systems
  • Knowledge of TCPIP/UDP/ICMP
  • Working knowledge of the OSI Reference Model
  • Knowledge of networking components (routers, switches, load balancers, wireless access points, etc)
  • Knowledge of Information Security components (IPS, IDS, WAF, SEIM, etc.)
  • Knowledge of vulnerability assessments
  • Proficient in Microsoft Office (Outlook, Word, Excel and Powerpoint)

DESIRABLE

  • GIAC Certified Forensic Analyst (GCFA)
  • GIAC Certified Forensic Examiner (GCFE)
  • EnCase Certified Examiner (EnCE)
  • Certified Computer Examiner (CCE)
  • Certified Forensic Computer Examiner (CFCE)
  • Certified Ethical Hacker (CEH)
  • Cisco Certified Network Associate (CCNA)
  • Certified Cloud Security Professional (CCSP)
  • Cisco Certified Internetwork Expert (CCIE)
  • Offensive Security Certified Professional (OSCP)
  • GIAC Network Forensic Analyst (GNFA)

Apply for this position

Application due
April 7, 2023
Category
Secure Development
Workplace
Coimbatore
Follow us

Apply Now