You haven't searched anything yet.
Minimum Requirements: Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. | ||
Years | Required/Preferred | Experience |
3 | Required | Utilize EDR/XDR platforms, including NetWitness, SentinelOne, Microsoft Defender for Endpoint, and related products, to correlate data from various network and security tools across the HHSC network. |
3 | Required | Research, document, and present threat hunting research on cyber threat actors specifically targeting HHSC business operations, information networks, and data. |
3 | Required | Leverage cyber threat hunting frameworks including PEAK, Sqrrl, and TaHiTI, to develop threat hunting hypotheses, determine scope, ensure repeatable processes, define outputs, and measure success in malicious behaviors detected, vulnerabilities discover. |
3 | Required | Employ threat modeling methodologies such as STRIDE, TRIKE, MITRE ATT&CK, and PASTA, to identify potential vulnerabilities, attack vectors, and threat actors specifically targeting HHSC networks, data, and users. |
3 | Required | Develop, maintain, and update HHSC threat hunting program documentation, including policies, SOPs, and playbooks, in accordance with industry, DIR, and HHSC guidelines and documentation standards. |
3 | Required | CTI analyst experience within a security operations center (SOC), providing support to internal cybersecurity Incident Response teams or external cybersecurity engagements on managed security services (MSS) teams in large-scale organizations. |
5 | Preferred | Experience with dynamic and static malware analysis tools and techniques, such as Trellix, IDA Pro, and Ghidra, as well as open-source tools such as Wireshark, VirusTotal, Hybrid Analysis, and Joe Sandbox. |
5 | Preferred | OSINT analyst experienced in utilizing brand and dark web intelligence tools such as Palo Alto XPANSE, Flashpoint, Recorded Future Intelligence Cloud, or Digital Shadows Searchlights. |
5 | Preferred | Utilize industry research, team meetings, collaboration with HHSC IT and business units, in-depth understanding of HHSCs strategic objectives, and candidates experience with NetWitness, SentinelOne, and Microsoft Defender for Endpoint. |
5 | Preferred | Perform scheduled and ad-hoc meetings with relevant software and other technical vendors such as NetWitness, SentinelOne, and Microsoft, to provide feedback on current EDR/XDR usage, performance, and utilization criteria. |
5 | Preferred | Troubleshoot, research, and resolve systemic issues in EDR/XDR tools, including NetWitness, SentinelOne, and Microsoft Defender for Endpoint, providing short-, medium- and long-term solutions to improve and maintain desired performance levels. |
5 | Preferred | Assist in data parsing and normalization in Net Witness, SentinelOne, and Microsoft Defender for Endpoint on data streams both existing and new, leveraging advanced knowledge of scripting languages like Python and PowerShell. |
5 | Preferred | One or more of the following certifications: Net Witness Analyst, Sentinel One IR Engineer, Microsoft Security Operations Analyst Associate, GCTI, GCFA, GREM, GCIH, GDAT. |