What are the responsibilities and job description for the Cyber Threat Hunt SME position at WarCollar Industries, LLC?
Job Description
Required Skills
Minimum of 10 years of progressively responsible experience in Computer Science, Cyber Security, Security Engineering, Network Engineering with emphasis in cyber security issues and operations, computer incident response, systems architecture, data management Or 4 additional years of experience in lieu of degree
Expert analytical and problem solving skills and demonstrated experience working nation state intrusion sets
The ideal candidate will have expert level experience in one or more of the following disciplines:
About WarCollar Industries
About us:
WarCollar Industries, LLC is a veteran-owned small business. We maintain a team of cybersecurity experts committed to protecting complicated data and distribution systems and providing decision makers with the most accurate assessment of residual risk possible. We work with our clients to solve the toughest challenges in the ever-evolving digital landscape. Services include network defense, computer network attack, secure network design, penetration testing and vulnerability assessment. WarCollar enables its clients to find, fix, stop, and ultimately solve cybersecurity problems across their entire enterprise.
WarCollar offers generous benefits including: Medical insurance premium coverage; PTO based on billable hours; federal holidays plus your birthday; matching 401k, education reimbursement plus paid training days; performance bonuses; referral bonuses; government shutdown protection; monthly team building events plus two major social events annually.
WarCollar Industries, LLC is an equal opportunity employer. WarCollar does not discriminate in employment based upon race, color, religion, sex (including pregnancy and gender identity), national origin, political affiliation, sexual orientation, marital status, disability, genetic information, age, membership in an employee organization, retaliation, parental status, status as a protected military veteran, or other non-merit factor.
- Provide strategic and tactical direction to cyber hunters and leadership based on trends and actionable intelligence related to threat capabilities
- Coordinate hunt activities between various internal and external hunt groups
- Construct and exploit threat intelligence to detect, respond, and defeat advanced persistent threats (APTs)
- Fully analyze network and host activity in successful and unsuccessful intrusions by advanced attackers
- Build fly-away kits utilizing an agile approach to identify the appropriate tools and technologies necessary to conduct hunt missions
- Conduct advanced threat hunt operations using known adversary tactics, techniques and procedures as well as indicators of attack in order to detect adversaries with persistent access to the enterprise
- Create and add custom signatures, to mitigate highly dynamic threats to the enterprise using the latest threat information obtained from multiple sources
- Perform malware analysis on samples obtained during the course of an investigation or hunt operation in order to create custom signatures
- Develop and produce reports on all activities and incidents to help maintain day to day status, develop and report on trends, and provide focus and situational awareness on all issues
- Piece together intrusion campaigns, threat actors, and nation-state organizations
- Manage, share, and receive intelligence on APT adversary groups
- Generate intelligence from their own data sources and share it accordingly
- Identify, extract, and leverage intelligence from APT intrusions
- Expand upon existing intelligence to build profiles of adversary groups Leverage intelligence to better defend against and respond to future intrusions
- Correlate data from intrusion detection and prevention systems with data from other sources such as firewall, web server, and DNS logs
- Notify the management team of significant changes in the security threat against the government networks in a timely manner and in writing via established reporting methods
- Coordinate with appropriate organizations within the intelligence community regarding possible security incidents. Conduct intra-office research to evaluate events as necessary, maintain the current list of coordination points of contact.
- Review assembled data with firewall administrators, engineering, system administrators and other appropriate groups to determine the risk of a given event
- Maintain knowledge of the current security threat level by monitoring related Internet postings, Intelligence reports, and other related documents as necessary
Required Skills
Minimum of 10 years of progressively responsible experience in Computer Science, Cyber Security, Security Engineering, Network Engineering with emphasis in cyber security issues and operations, computer incident response, systems architecture, data management Or 4 additional years of experience in lieu of degree
Expert analytical and problem solving skills and demonstrated experience working nation state intrusion sets
The ideal candidate will have expert level experience in one or more of the following disciplines:
- Windows and/or Linux operating systems
- Network forensics
- Demonstrated ability using at enterprise scale:
- SysMon or EDR solutions for host-based Cyber Threat Hunting, or
- Netflow/pcap or NDR solutions for network-oriented Cyber Threat Hunting
- Malware analysis/reverse engineering
- Exploit development
- On-net pursuit/response
- Familiarity with the following classes of enterprise cyber defense technologies:
- Security Information and Event Management (SIEM) systems
- Network Intrusion Detection System/Intrusion Prevention Systems (IDS/IPS)
- Host Intrusion Detection System/Intrusion Prevention Systems (IDS/IPS)
- Network and Host malware detection and prevention (NDR/EDR)
- Network and Host forensic applications
- Web/Email gateway security technologies
- Security Orchestration, Automation, and Response (SOAR)
- CISSP or CEH
- DoD 8570 IAT Level III or CSSP-SPM
- BS (bachelor's degree in electrical engineering, computer engineering, computer science, or other closely related IT discipline)
About WarCollar Industries
About us:
WarCollar Industries, LLC is a veteran-owned small business. We maintain a team of cybersecurity experts committed to protecting complicated data and distribution systems and providing decision makers with the most accurate assessment of residual risk possible. We work with our clients to solve the toughest challenges in the ever-evolving digital landscape. Services include network defense, computer network attack, secure network design, penetration testing and vulnerability assessment. WarCollar enables its clients to find, fix, stop, and ultimately solve cybersecurity problems across their entire enterprise.
WarCollar offers generous benefits including: Medical insurance premium coverage; PTO based on billable hours; federal holidays plus your birthday; matching 401k, education reimbursement plus paid training days; performance bonuses; referral bonuses; government shutdown protection; monthly team building events plus two major social events annually.
WarCollar Industries, LLC is an equal opportunity employer. WarCollar does not discriminate in employment based upon race, color, religion, sex (including pregnancy and gender identity), national origin, political affiliation, sexual orientation, marital status, disability, genetic information, age, membership in an employee organization, retaliation, parental status, status as a protected military veteran, or other non-merit factor.