Threat Hunter @ Trustwave | Jobright.ai
JOBSarrow
RecommendedLiked
0
Applied
0
External
0
Threat Hunter jobs in United States
200+ applicants
company-logo

Trustwave · 6 days ago

Threat Hunter

ftfMaximize your interview chances
Cloud SecurityCyber Security
check
Comp. & Benefits
badNo H1BnoteU.S. Citizen Onlynote

Insider Connection @Trustwave

Discover valuable connections within the company who might provide insights and potential referrals.
Get 3x more responses when you reach out via email instead of LinkedIn.

Responsibilities

Perform Proactive and Continual Threat Hunts for Trustwave clients.
Conduct hunting, investigation, containment, reporting, and client engagement related to hunting activities utilizing Trustwave’s proprietary threat hunting platform.
Contribute use-case development and detection strategies to further improve Trustwave’s proprietary threat hunting platform.
Work closely with the engineering team to lead the integration of Trustwave SpiderLabs Threat Hunt platform with the GTDB (Global Threat Database), and the Trustwave Fusion portal.
Incumbent must have a vision for 'making intel actionable' for all Trustwave security analysts.
Adding proper intelligence feeds / sources, scripting extraction of intel from various potential sources.
Bring a vision to the team to improve our approach and utilization of threat intel and drive that vision to reality.
Interface with security researchers from Trustwave partners, such as Palo Alto Unit 42, Carbon Black, and Cybereason.
Determine joint projects and publications that can be prepared surrounding new and emerging threats that our team discovers, be a point person discussing threats with potential partners.
Support sales team to close major deals by clearly and concisely explaining the value and expected outcomes of a Trustwave threat hunt.

Qualification

Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.

Incident responseComputer forensic investigationsMalware analysisEndpoint-based threat huntingWindows system administrationNetwork hygieneWindows/Linux/OSX securityThreat actor groups knowledgeMITRE ATT&CK framework

Required

Experience conducting incident response and computer forensic investigations.
Experience conducting endpoint-based threat hunting.
In-depth knowledge of Windows system administration and good network hygiene.
Knowledge/experience with Windows/Linux/OSX security and investigations.
Knowledge of various threat actor groups and TTPs they are known to utilize.
Experience developing endpoint-based rules to detect such TTPs.
Knowledge and experience implementing MITRE ATT&CK framework into hunting and detection mechanisms.
Skilled speaker and able to communicate comfortably with senior security executives.
Skilled writer, able to communicate both our service and emerging threat activity through written communication.
A high school diploma or equivalent is required.
Per Federal government contracting requirements, candidate must be a US citizen.
Candidate must potentially pass and maintain a National Agency Check with Local Agency and Credit Checks (NACLC).

Preferred

A college or university degree is a plus.
Malware analysis experience is also a major advantage.

Company

Trustwave

company-logo
Trustwave is a security services firm that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats.

Funding

Current Stage
Late Stage
Total Funding
$10M
Key Investors
FTV Capital
2024-01-05Acquired· undefined
2004-05-19Series A· $10M

Leadership Team

leader-logo
Eric Harmon
Chief Executive Officer
leader-logo
J. Lawrence Podmolik
CTO
linkedin
Company data provided by crunchbase
logo

Orion

Your AI Copilot