Cyber Security Threat Hunter - (Spring, TX)
Background Understanding of Operating System Internals (Windows, nix, MacOS) Ideal Hunt resource would have a mix of the following skills, background and certs. Skills Strong understanding of network security concepts Strong understanding of current attacker tradecraft SIEM background (Splunk, ELK, etc.) Background with common industry EDR solutions (FireEye, Carbon Black, Endgame, Falcon, etc.) Scripting expertise (PowerShell, Python, etc.) Basic Reverse Engineering expertise (Static andor Dynamic) Desired Background Experienced SOC Analyst Incident ResponseForensics Red TeamerPenetration Tester Determined problem solver Certifications Offensive Security Offensive Security Certified Professional (OSCP) Offensive Security Certified Expert (OSCE) SANS GIAC Certified Forensic Analyst (GCFA) GIAC Penetration Tester (GPEN) GIAC Certified Incident Handler (GCIH) GIAC Defending Advanced Threats (GDAT) GIAC Reverse Engineering Malware (GREM) ISCsup2 Certified Details Systems Security Professional (CISSP) BlackHat
ADVERTISEMENT
From TopUSAJobs - 1 month ago