Hiring!! Hiring!! Hiring!!
Dear Folks,
We have an urgent Opening with one of our TOP MNC Client for Threat Hunter / Threat Hunting / Threat Intel/ MITRE ATT&CK role.
Please find the below Job Description:
Skill- Threat Hunter / Threat Hunting/ Threat Intel/ MITRE ATT&CK
Mumbai location- 5 days - WFO - 5-8 YEARS
Any Location _ Hybrid_ 5-12 years
The candidate will work closely with Onshore & offshore team on the Threat Intelligence & hunting activities. This includes developing methodologies for Threat intelligence. Analyze, develop & disseminate indicators of compromise (IOCs), launch Threat Hunting campaigns based on Industry adopted best practices based on MITRE ATT&CK framework & others.
Mandatory Skills
1. Minimum 7 to 10 years of experience in Threat Intelligence & Hunting
2. Experienced in discovering and gathering Threat data from intelligence feeds
3. Prior experience of developing methodologies for threat data mining to uncover the threat actors and threat vectors
4. Experienced in maintaining, developing, and continuously evaluating cyber threat intelligence, & threat intelligence/data sources
5. Maintain an understanding of the overall threat landscape (cyber, malware, botnets, phishing, DDoS, physical) applicable to Carrier
6. Collect, analyze, investigate, store, and disseminate indicators of compromise (IOCs)
7. Regularly develop and produce written cyber, brand and threat intelligence reports
8. Provide support to the Security Incident Response Team and SOC in the effective detection, analysis, and containment of attacks, as well as researching potential IOCs and linking to intelligence
9. Draft, edit, and disseminate threat intelligence information/briefs to stakeholders, executive leadership, and others
10. Monitoring of security procedures and practices; recommend optimizations and improvements when gaps are identified
11. Collaborate with Monitoring and Incident Response team & Content Engineering team to build proactive detection logic for threat detection
12. Assist the SOC Monitoring & IR team in analysis and resolution of Major incidents.
13. Leverage Threat Intelligence gathered to execute Threat Hunting campaigns. Following types of Threat Hunting campaigns will be executed –
o Threat Indicator driven threat hunting
o Hypotheses driven threat hunting
o MITRE ATT&CK framework driven hunting campaigns
Interested folks can share your profile at payel.maity@alikethoughts.com
#threathunting #threatintel #threathunter #mitreattack
#Cybersecurity #hiringalert
Security Engineer at The Iowa Clinic
1moi'm 6000 miles away.. sorry!