Earnbetter

Job Search Assistant

Logo

Cyber Threat Hunter - Remote

MindPoint Group • Remote • Posted 9 days ago

Boost your interview chances in seconds

Tailored resume, cover letter, and cheat sheet

Remote • Full-time • Senior Level

Job Highlights

Using AI ⚡ to summarize the original job post

MindPoint Group, LLC is seeking a Cyber Threat Hunter to join their team, focusing on identifying and mitigating advanced global threats targeting federal infrastructure. This role involves active hunting for Indicators of Compromise and APT Tactics, Techniques, and Procedures, creating detailed incident reports, and collaborating with various teams to contain and investigate major incidents. The position requires an active Top Secret clearance with the ability to obtain an SCI, and offers a unique opportunity to work with an experienced team in a critical role within the client's cybersecurity operations.

Responsibilities

  • Actively hunt for Indicators of Compromise (IOC) and APT Tactics, Techniques, and Procedures (TTP) in the network and in the host as necessary
  • Search network flow, PCAP, logs, and sensors for evidence of cyber-attack patterns, and hunt for Advanced Persistent Threats (APT)
  • Create detailed Incident Reports and contribute to lessons learned in collaboration with the appropriate team
  • Collaborate with the SOC and Threat Analysts to contain and investigate major incidents
  • Provide simple and reusable hunt tactics and techniques to a team of security engineers, SIEM specialists, and SOC analysts
  • Work with leadership and the engineering team to improve and expand available toolsets
  • Analyze network perimeter data, flow, packet filtering, proxy firewalls, and IPS/IDS to create and implement a concrete plan of action to harden the defensive posture
  • Monitor open source and commercial threat intelligence for IOCs, new vulnerabilities, software weaknesses, and other attacker TTPs.

Qualifications

Required

  • 10 years of general experience and 8 years of relevant Cybersecurity experience
  • Experience with securing and hardening IT infrastructure
  • Demonstrated or advanced experience with computer networking and operating systems
  • Experience with operational security, including security operations center (SOC), incident response, malware analysis, or IDS and IPS analyses
  • Demonstrated proficiency with regular expression and scripting languages, including Python or PowerShell
  • Demonstrated proficiency with data hunting, including ELK, Splunk, Apache Spark, or AWS Stack
  • Familiarity with: Netflow data, DNS logs, Proxy Logs
  • Experience with network hunting, including Bro Logs, Netflow, PCAP, or PaloAlto firewalls and proxies
  • Knowledge of Windows and Linux OS- and command line
  • Ability to analyze malware, extract indicators, and create signatures in Yara, Snort, and IOCs
  • Strong analytical skills and the ability to effectively research, write, communicate and brief varying levels of audiences to include at the executive level
  • Knowledge related to the current state of cyber adversary tactics and trends
  • Knowledge of the Splunk search language, search techniques, alerts, dashboards, and report building
  • Knowledge of the TCP/IP networking stack and network IDS technologies
  • Active Top Secret clearance with the ability to obtain an SCI

Preferred

  • Bachelor-s Degree in CS-related field
  • Certifications: CISSP, SANS GCTI, CCSP, GCFA, GCFE, GREM, GNFA, or OSCP Certification

About MindPoint Group

MindPoint Group is a cybersecurity consulting firm specializing in providing tailored cybersecurity solutions for various industries such as cloud services, financial services, government, and healthcare. They offer services for different roles like CIO, CISO, DevSecOps, IT Operations, and Security, addressing critical cybersecurity needs like incident response, penetration testing, FedRAMP compliance, and more. Their products include MPGSOC, Automation Counselor, and Lockdown Enterprise, aimed at enhancing cybersecurity and streamlining processes, and they offer 24/7 Managed Security Services to help organizations detect and respond to cyber threats efficiently.

Full Job Description

Cyber Threat Hunter - Remote

**Department:** SOC

**Location:** Washington, DC

Mindpoint Group has an exciting opportunity to join the Cyber Threat Hunt team of one of our largest clients. The **Cyber Threat Hunter** is critical to the continued maturation of the client-s operational capabilities, and you will join an established and experienced group that is motivated to provide excellent services in defending federal infrastructure. You will work closely with other threat hunters, threat analysts, and an established SOC and we will rely on you to hunt down the most advanced global threats. We need you to see the security stack and all of its capabilities, identify what might have gotten through and how, and aggressively pursue the threat.

**Responsibilities:**

+ Actively hunt for Indicators of Compromise (IOC) and APT Tactics, Techniques, and Procedures (TTP) in the network and in the host as necessary

+ Search network flow, PCAP, logs, and sensors for evidence of cyber-attack patterns, and hunt for Advanced Persistent Threats (APT)

+ Create detailed Incident Reports and contribute to lessons learned in collaboration with the appropriate team

+ Collaborate with the SOC and Threat Analysts to contain and investigate major incidents

+ Provide simple and reusable hunt tactics and techniques to a team of security engineers, SIEM specialists, and SOC analysts

+ Work with leadership and the engineering team to improve and expand available toolsets

+ Analyze network perimeter data, flow, packet filtering, proxy firewalls, and IPS/IDS to create and implement a concrete plan of action to harden the defensive posture

+ Monitor open source and commercial threat intelligence for IOCs, new vulnerabilities, software weaknesses, and other attacker TTPs.

**Required:**

+ 10 years of general experience and 8 years of relevant Cybersecurity experience

+ Experience with securing and hardening IT infrastructure

+ Demonstrated or advanced experience with computer networking and operating systems

+ Experience with operational security, including security operations center (SOC), incident response, malware analysis, or IDS and IPS analyses

+ Demonstrated proficiency with regular expression and scripting languages, including Python or PowerShell

+ Demonstrated proficiency with data hunting, including ELK, Splunk, Apache Spark, or AWS Stack

+ Familiarity with: Netflow data, DNS logs, Proxy Logs

+ Experience with network hunting, including Bro Logs, Netflow, PCAP, or PaloAlto firewalls and proxies

+ Knowledge of Windows and Linux OS- and command line

+ Ability to analyze malware, extract indicators, and create signatures in Yara, Snort, and IOCs

+ Strong analytical skills and the ability to effectively research, write, communicate and brief varying levels of audiences to include at the executive level

+ Knowledge related to the current state of cyber adversary tactics and trends

+ Knowledge of the Splunk search language, search techniques, alerts, dashboards, and report building

+ Knowledge of the TCP/IP networking stack and network IDS technologies

**Desired:**

+ Bachelor-s Degree in CS-related field preferred

+ Certifications Desired: CISSP, SANS GCTI, CCSP, GCFA, GCFE, GREM, GNFA, or OSCP Certification

**Clearance:**

+ Active Top Secret clearance with the ability to obtain an SCI required*

**Location:**

+ This is a remote position