Security Analyst - Threat Hunter jobs in United States
cer-icon
Apply on Employer Site
company-logo

CYPFER ยท 5 months ago

Security Analyst - Threat Hunter

CYPFER is a global leader in cybersecurity, specializing in ransomware post-breach remediation and first response to cyber-attacks. They are seeking a Security Analyst - Threat Hunter who will create detection engineering solutions, analyze tactics and malware, and collaborate with various teams to enhance cybersecurity measures.

Cyber Security

Responsibilities

Create detection engineering solutions to proactively identify and mitigate sophisticated threat actors (APTs/UNCs) and insider threats
Analyze, research and reverse engineer Tactics Techniques and Procedures (TTPs) and malware samples to create detections based on industry leading frameworks such as MITRE ATT&CK
Develop, plan, lead and participate in Purple Team Exercises focusing on and discovering and mitigating emerging threats
Innovate and create novel solutions including User Behavior Analytics (UBA) models by leveraging Data Science and Machine Learning (ML), bringing cybersecurity and data science closer
Collaborate and foster relationships with multiple teams including Adversary Emulation (Red Team), Data Science, Threat Intelligence, Security Operation Centre (SOC) and Digital Forensics and Incident Response (DFIR) to drive pragmatic cyber security improvement
Work closely with our dedicated Development team to create and enhance our threat hunting in-house developed products
Develop, implement, and refine our defensive tradecraft and tooling
Provide bespoke advisory and consultation services to senior executive management and perform as a cyber security SME for emerging threats and investigations
Work and utilize vast data sources, data lakes and security vendor solutions
In conjunction with other members of the Global Security group, you would ensure the ongoing enhancement of the threat hunting methodologies and overall strategy to detect and alert of cyber threats

Qualification

Cyber Security operationsMITRE ATT&CK frameworkOffensive security toolsPythonMalware analysisDigital ForensicsCloud expertiseReverse engineeringProgramming languagesBlue/Purple team exercisesDefensive certifications

Required

5+ years of Cyber Security operations experience preferably comprised of both defensive and offensive roles
Familiarization with the cyber security Kill Chain phases and MITRE ATT&CK framework TTPs
Knowledge of offensive security tools, techniques, procedures and security domains focusing on operational security
Solid grasp of cyber security controls/products including both endpoint, network, application, and infrastructure
Knowledge of current regional and global threat landscape
Strong knowledge of Python

Preferred

Hands-on experience in malware analysis, reverse engineering, and security research
Prior experience conducting blue/purple team exercises or penetration testing
Digital Forensics skills including memory/network/OS/disk forensics
Defensive oriented certification such as GIAC GREM, GCFA or other reputable, technical, and defensive/offensive focused certification
Cloud knowledge and expertise of leading cloud providers (AWS, GCP, Azure)
Programming languages such as C++/C#/JavaScript/Assembly
Hands-on experience working with LLM and RAG technologies

Company

CYPFER

twittertwitter
company-logo
Global Cyber Certainty Champions, in an uncertain digital world.

Funding

Current Stage
Growth Stage

Leadership Team

leader-logo
Daniel Tobok
Chief Executive Officer
linkedin
leader-logo
Alexander Gross
Chief Business Officer
linkedin
Company data provided by crunchbase