SIGN IN
Data Security Analyst III, Threat Hunter - Red Hat jobs in United States
cer-icon
Apply on Employer Site
company-logo

Neos Consulting Group · 10 hours ago

Data Security Analyst III, Threat Hunter - Red Hat

Neos Consulting Group is seeking a Data Security Analyst III (Threat Hunter) for a contract role with their client in Austin, TX. The role involves proactively identifying and investigating advanced cyber threats, developing hypothesis-driven hunts, and collaborating with various cybersecurity teams to enhance threat detection capabilities.
Information TechnologyInformation Services
badNo H1Bnote

Responsibilities

Proactively conduct threat hunting activities to identify malicious activity, advanced persistent threats, and indicators of compromise not detected by automated tools
Develop and execute hypothesis-driven hunts based on threat intelligence, adversary tactics, techniques, and procedures (TTPs), and organizational risk profiles
Analyze endpoint, network, identity, and cloud telemetry to detect anomalous or suspicious behavior
Investigate and validate potential security incidents, determine root cause, and assess scope and impact
Collaborate with incident response, SOC, and detection engineering teams to support containment, eradication, and recovery activities
Translate threat hunting findings into actionable detection logic, alerts, and analytics to improve security monitoring
Document hunting methodologies, findings, and recommendations in formal reports and knowledge repositories
Contribute to the development and tuning of security use cases, queries, and detection rules across SIEM, EDR, NDR, and cloud security platforms
Leverage threat intelligence sources to track emerging threats, attacker tools, and campaigns relevant to the organization
Support purple team activities, tabletop exercises, and continuous adversary simulation efforts
Maintain awareness of evolving attacker techniques and emerging cybersecurity threats

Qualification

Threat huntingSIEM analysisCloud securityIncident responseMalware analysisNIST standardsForensic investigationsSecurity policiesAnalytical skillsCloud certificationsEndpoint security toolsEmail threat managementData loss preventionNetwork security toolsProblem-solvingCritical thinkingCommunication skillsCollaboration

Required

8 years Required – Strong understanding of attacker tactics, techniques, and procedures
8 years Required – Experience analyzing logs and telemetry from SIEM, EDR/XDR, network security, identity platforms, and cloud environments
8 years Required – Proficiency in query languages and scripting used for threat hunting
8 years Required – Solid knowledge of Windows, Linux, and cloud operating systems, including common attack vectors and persistence mechanisms
8 years Required – Proven expertise in security considerations of cloud computing: data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks
8 years Required – Knowledge and understanding of threat analysis and assessment of potential and current information security risks/threats and designing solutions to mitigate those threats
8 years Required – Knowledge and experience working with relevant National Institute of Standards and Technology (NIST) standards
8 years Required – Familiarity with threat intelligence sources, malware analysis concepts, and digital forensics fundamentals
8 years Required – Experience documenting investigations, creating hunt reports, and communicating technical findings to diverse audiences
8 years Required – Strong analytical, problem-solving, and critical-thinking skills
8 years Required – Ability to work independently while collaborating effectively within cross-functional cybersecurity teams
8 years Required – Ability to resolve complex security issues in diverse and decentralized environments; to learn, communicate, and teach new information and security technologies; and to communicate effectively
8 years Required – Conduct forensic investigations on cyberattacks to determine how they occurred and how they can be prevented in the future
8 years Required – Experience creating, reviewing, and updating security policies and standards for public, private, and hybrid cloud contexts

Preferred

3 Years Preferred – GSEC, CEH, CISA, CCSP
3 years Preferred – Certification as an AWS Solutions Architect, Cloud Security Certification, and/or OpenStack Administrator Certification a plus (other cloud-related certifications also a plus)
3 years Preferred – Experience with Endpoint Detection and Response tools (e.g., EndGame, CrowdStrike, CyberReason)
3 years Preferred – Experience with Email Threat Management tools (e.g., Proofpoint, MimeCast, Microsoft)
3 years Preferred – Experience with SIEM platforms (e.g., Splunk, Rapid7, SumoLogic)
3 years Preferred – Experience with Data Loss Prevention / Cloud Access Security Brokers (e.g., Symantec, Microsoft, Bitglass, Netskope)
3 years Preferred – Experience with Cloud Enterprise Network Security tools (e.g., Cisco Umbrella, Palo Alto, ZScaler)

Company

Neos Consulting Group

twittertwittertwitter
company-logo
Neos is an Austin Tx based IT consulting and staffing firm specializing in Texas state and local governments, & higher education verticals.

Funding

Current Stage
Growth Stage

Leadership Team

leader-logo
Richard Carter
Founder & Partner
linkedin
Company data provided by crunchbase