About Hunter StrategyHunter Strategy has a unique philosophy to technical project delivery.
Cybersecurity Detection Engineer
Hunter Strategy
United States
Full TimeSalaryNegotiable
Posted on 19th Sep 2024
About Hunter Strategy
Hunter Strategy has a unique philosophy to technical project delivery. We treat all our customers like mission partners because they rely on our team to meet their objectives through complex software engineering, cloud operations, and cyber risk management solutions. Hunter Strategy was founded on the premise that IT is 21st century infrastructure - critically important but only instrumentally valuable. Accordingly, our teams look at problems with a single objective: the identification and enablement of the right capability to address the most vexing problems our Mission Partners face. We continue to support our partners' success by leveraging the right technology, with the right plan, and the right team to address tomorrow's challenges today.
Job Overview
We are seeking a skilled Cybersecurity Detection Engineer to join our Information Technology Security Office (ITSO) Security Operations Center (SOC). The ideal candidate will blend technical skills, threat research experience, and knowledge of adversary techniques to enhance our cybersecurity defenses.
Key Responsibilities
Create high-fidelity, actionable alerts using new and existing data sources for quick and effective threat identification, analysis, and eradication
Identify opportunities to improve the effectiveness of existing detection efforts
Develop methodologies to maintain and maximize the integrity and effectiveness of existing alerting
Create, periodically review, test, and validate custom detection content
Leverage cybersecurity threat intelligence to defend against real-world threats
Collaborate with the SOC’s incident response teams to meet operational needs
Stay familiar with adversary Tactics, Techniques, and Procedures (TTPs)
Qualifications
Bachelor’s degree in Computer Science, Cybersecurity, or a related field plus 8 years of professional experience (4 additional years of professional experience in lieu of degree)
Passed AZ-500 Microsoft Azure Security Technologies exam
Minimum 3 years of experience in detection engineering, threat hunting, security operations, or incident response using Splunk Enterprise Security or Microsoft Sentinel
Experience with adding, updating, and deleting detection rules in Splunk Enterprise Security and Microsoft Sentinel
Proficiency in detection engineering methodologies, including SNORT and YARA rules
Proficiency in Python programming, Bash, and PowerShell
Proficiency in Splunk’s Search Processing Language, React, Kusto Query Language, and the Common Information Model (CIM)
Knowledge and experience in leveraging cybersecurity threat intelligence, indicators of compromise, STIX/TAXII data feeds, MITRE ATT&CK, and SIEM integrations
Strong experience in networking principles, operating systems (Linux / Windows), and security tools such as IDS/IPS, firewalls, proxy servers, and Endpoint Detection and Response (EDR)
Knowledge of Windows Sysinternal Suite (including Sysmon), Unix auditd, and how to tune configuration files for identification of malicious activity
Required Skills
Strong analytical and problem-solving skills
Excellent communication and collaboration abilities
Ability to work in a fast-paced environment and handle multiple priorities
Continuous learning mindset to stay updated on the latest cybersecurity trends and threats
This position is contingent on contract award.
Instructions
Provide Accurate Personal Information
If the job requires a CV, ensure that you upload an up to date CV
The name on your application should match your legal identification.
All Fields marked with * are mandatory
Please ensure you regularly check the email address provided during the application process for any updates from Tuhustle or potential employers. Your application status, interview invitations, or job offers will be sent via email. Respond promptly to any messages to maintain your candidacy.
Job Application Form
Modal title
Be bold
Motivate teams to do their best work. Offer best practices to get users going in the right direction. Be bold and offer just enough help to get the work started, and then get out of the way. Give accurate information so users can make educated decisions. Know your user's struggles and desired outcomes and give just enough information to let them get where they need to go.
Be optimistic
Focusing on the details gives people confidence in our products. Weave a consistent story across our fabric and be diligent about vocabulary across all messaging by being brand conscious across products to create a seamless flow across all the things. Let people know that they can jump in and start working expecting to find a dependable experience across all the things. Keep teams in the loop about what is happening by informing them of relevant features, products and opportunities for success. Be on the journey with them and highlight the key points that will help them the most - right now. Be in the moment by focusing attention on the important bits first.
Be practical, with a wink
Keep our own story short and give teams just enough to get moving. Get to the point and be direct. Be concise - we tell the story of how we can help, but we do it directly and with purpose. Be on the lookout for opportunities and be quick to offer a helping hand. At the same time realize that novbody likes a nosy neighbor. Give the user just enough to know that something awesome is around the corner and then get out of the way. Write clear, accurate, and concise text that makes interfaces more usable and consistent - and builds trust. We strive to write text that is understandable by anyone, anywhere, regardless of their culture or language so that everyone feels they are part of the team.