Find Job

cyber Security(Anywhere)

Salary: Agreement
Work form: Full time
Posting Date: 08/11/2025
Deadline: 15/12/2020

This job has expired, you can refer to some similar jobs here:


Information Security Cyber Threat Intelligence and Cyber Threat Hunter II
Summary of This Role
Performs research and analysis searching for indications of advanced threat actors existing on the network. Analyze available data sources, security tools, and threat trends and lead security monitoring and analysis techniques to identify attacks against the enterprise. Works with the Threat Management Center team to operationalize new and innovative techniques of discovering advanced threat actors, and to ensure there are optimal data sources to enrich hunting capabilities. Provides subject matter expertise in support of cyber incident response actions. Produces findings and develops multiple products to convey relevant data to various audiences. Reporting and collaborating with the different areas of Business will be required, as well as providing relevant lesson learned output that can be fed into the Company's threat landscape.
What Part Will You Play?
Must demonstrate knowledge of tactics, techniques, and procedures associated with malicious
insider activity, organized crime/fraud groups and both state and non-state sponsored threat actors.
Must understand typical threat actor profiles, the typical indicators associated with those
profiles, and be able to synthesize them to develop innovative techniques to detect threat actor activity. Analyze available data sources, security tools, and threat trends and lead security monitoring and analysis techniques to identify attacks against the enterprise.
Ability to analyze the environment from a threat actor's perspective, including the skill to
conduct prioritized identification of vulnerable assets, and then devise techniques to detectpotential attack activity.
Minimum Qualifications:
Bachelor's Degree Relevant Experience or Degree in: Concentration in information security,
networking or development / computer science
Typically, Minimum 2 Years Relevant Exp
Experience within Information Technology (networking, development, or systems). Experience
managing projects. Additional 4 years related experience may be considered in lieu of a degree.
Certified Cyber Threat Hunter, Certified Ethical Hacker, Certified Cyber Threat Analyst (CCTA),
SANS.
Preferred Qualifications
Typically, Minimum 4 Years Relevant Exp
Experience within Information Technology (networking, development, or systems).
Experience managing projects.
One or more of the following: CCTH, CEH, CISSP, GCIH, GCIA, CCTA, SANS, CISSP
What Are Our Desired Skills and Capabilities?
Skills / Knowledge - Developing professional expertise, applies company policies and procedures
to resolve a variety of issues.
Job Complexity - Works on problems of moderate scope where analysis of situations or data
requires a review of a variety of factors. Exercises judgment within defined procedures and practices to determine appropriate action. Builds productive internal/external working relationships.
Supervision - Normally receives general instructions on routine work, detailed instructions on
new projects or assignments
Experience with either Red team or Blue team operations and ability to think both like an
attacker and a defender.- Ability to describe and perform the functions of Red Team or Blue Team operations, and be able to translate these functions into threat hunting activities
Strong experience with Digital forensics on host or network from malware perspective, ability to
identify anomalous behavior on network or endpoint devices- Ability with direct supervision to effectively utilize forensics and log analysis tools to identify anomalous behavior on the network or on endpoint devices
Experience with activities involving APT Threats - Ability to describe and recognize Advanced
Persistent Threat (APT) tools, techniques, and procedures.
Ability to accurately and completely source all data used in Hunt, relevant intelligence,
assessment and/or planning products - Skill in conducting research using deep web techniques, Skill in defining and characterizing all pertinent aspects of the operational environment.
Ability to communicate complex information, concepts, or ideas in a confident and
well-organized manner through verbal, written, and/or visual means - Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships.

Submit profile

(Anywhere)

About the company


Position cyber Security recruited by the company (Anywhere) at , Joboko automatically collects the salary of , finds more jobs on Cyber Security or (Anywhere) company in the links above

About the company

  • Employer support:
  • +84 962.107.888