This job has expired, please see additional jobs below
Engineer 2, Cyber Threat Discovery
Entertainment & Media Industry Company
Moorestown, NJ, United States
Job Details - this job has expired, please see similar jobs below
Summary:
Are you passionate about working to solve business and security problems that directly impact our brand, assets, and reputation? Company's Security Intelligence, Data Analytics & Discovery team is looking for a Threat Discovery Engineer/Hunter to identify persistent attackers, unseen threats, and vulnerabilities. The candidate must have a curious investigative mind, an interest in information security, and can communicate to varied audiences.
Core Responsibilities:
• Exploration and integration of new cybersecurity testing tools, processes, and capabilities
• Contribute to the tuning and development of security information and event monitoring systems (SIEM) use cases and other security control configurations to enhance threat detection capabilities
• Hands-on, collaborative cybersecurity testing of critical IT environments, applications, systems, etc.
• Have a formal understanding on how to discover and analyze vulnerabilities
• Continuously improve processes for use across multiple detection sets for more efficient operations
• Perform in-depth investigation of events of interest identified during threat hunt activities or security alerts received from various security technologies
• Liaise with appropriate internal stakeholders during the investigation process to determine whether a security incident has occurred, identify the root cause and provide appropriate recommendations for remediation
• Network and system integrity testing (i.e., searching for possible unauthorized behavior/signs of compromise)
• Proactively 'hunt' for potential malicious activity and incidents across multiple customers using advanced threat network and host-based tools
• Identify and perform escalations to the Security Incident Response team
• Provide support in the detection, response, mitigation, and reporting of cyber threats affecting client networks with the ability to evaluate IT environments and identify security goals, objectives and requirements
• Maintain and employ a strong understanding of advanced threats, continuous vulnerability assessment, response and mitigation strategies used in Cybersecurity operations
• Perform risk analysis, attack simulation, application-level automated & manual Ethical Hacking and develop proof-of-concept exploits.
• Routinely conduct investigations into security data analytics use case findings; provide feedback to and work with data engineer and data scientists in order to develop and harden models
• Collaborate with security data analytics and security intelligence team
Required Experience:
• Knowledge of current hacking techniques, vulnerability disclosures, data breach incidents, and security analysis techniques.
• Knowledge of malware families, botnets, threats by sector, and various attack campaigns and attacker methods, tools/techniques/practices.
• Demonstrated experience with Windows and/or Unix/Linux operating systems including command-line tasks and scripting
• Demonstrated coding experience in at least one of the following Bash, Powershell, Python, Javascript, PERL, or Ruby
• Demonstrated technical experience with Networking (eg. data flows, architecture, protocols, traffic analysis, wireless, etc)
• Familiarity with performing Ethical Hacking of both web applications and their associated platforms (e.g., J2EE, .Net, Apache, IIS, Websphere, etc.) and infrastructure elements (e.g., Windows/Linux operating systems, Oracle/SQL servers, firewalls, routers, switches, etc.).
• Familiar with common commercial and/or open source vulnerability assessment tools and techniques used for evaluating operating systems, networking devices, databases and web servers.
• Familiarity with threat modeling, development of attack plans, performing manual & automated Ethical Hacking, & develop proof of concept exploits.
• Experience working with security intelligence, data analytics, security incident response, and forensic investigation teams
• Red Team/Blue Team/Pen-Testing experience required
Education/certifications:
• BA/BS (MA preferred) in Computer Science, Cybersecurity, or related field
• 2-5 years experience working in this area (data analyst/business analyst)
• Optional Certification(s): CISSP, CISA, CISM, or GIAC
Company is anEOE/Veterans/Disabled/LGBT employerand all qualified applicants will receive consideration for employment without regard to age, race, creed, color, national origin, ancestry, marital status, affectional or sexual orientation, gender identity or expression, disability, nationality, sex or any other legally protected category.