Neos Consulting Group · 10 hours ago
Data Security Analyst III, Threat Hunter - Red Hat
Neos Consulting Group is seeking a Data Security Analyst III (Threat Hunter) for a contract role with their client in Austin, TX. The role involves proactively identifying and investigating advanced cyber threats, developing hypothesis-driven hunts, and collaborating with various cybersecurity teams to enhance threat detection capabilities.
Information TechnologyInformation Services
Responsibilities
Proactively conduct threat hunting activities to identify malicious activity, advanced persistent threats, and indicators of compromise not detected by automated tools
Develop and execute hypothesis-driven hunts based on threat intelligence, adversary tactics, techniques, and procedures (TTPs), and organizational risk profiles
Analyze endpoint, network, identity, and cloud telemetry to detect anomalous or suspicious behavior
Investigate and validate potential security incidents, determine root cause, and assess scope and impact
Collaborate with incident response, SOC, and detection engineering teams to support containment, eradication, and recovery activities
Translate threat hunting findings into actionable detection logic, alerts, and analytics to improve security monitoring
Document hunting methodologies, findings, and recommendations in formal reports and knowledge repositories
Contribute to the development and tuning of security use cases, queries, and detection rules across SIEM, EDR, NDR, and cloud security platforms
Leverage threat intelligence sources to track emerging threats, attacker tools, and campaigns relevant to the organization
Support purple team activities, tabletop exercises, and continuous adversary simulation efforts
Maintain awareness of evolving attacker techniques and emerging cybersecurity threats
Qualification
Required
8 years Required – Strong understanding of attacker tactics, techniques, and procedures
8 years Required – Experience analyzing logs and telemetry from SIEM, EDR/XDR, network security, identity platforms, and cloud environments
8 years Required – Proficiency in query languages and scripting used for threat hunting
8 years Required – Solid knowledge of Windows, Linux, and cloud operating systems, including common attack vectors and persistence mechanisms
8 years Required – Proven expertise in security considerations of cloud computing: data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks
8 years Required – Knowledge and understanding of threat analysis and assessment of potential and current information security risks/threats and designing solutions to mitigate those threats
8 years Required – Knowledge and experience working with relevant National Institute of Standards and Technology (NIST) standards
8 years Required – Familiarity with threat intelligence sources, malware analysis concepts, and digital forensics fundamentals
8 years Required – Experience documenting investigations, creating hunt reports, and communicating technical findings to diverse audiences
8 years Required – Strong analytical, problem-solving, and critical-thinking skills
8 years Required – Ability to work independently while collaborating effectively within cross-functional cybersecurity teams
8 years Required – Ability to resolve complex security issues in diverse and decentralized environments; to learn, communicate, and teach new information and security technologies; and to communicate effectively
8 years Required – Conduct forensic investigations on cyberattacks to determine how they occurred and how they can be prevented in the future
8 years Required – Experience creating, reviewing, and updating security policies and standards for public, private, and hybrid cloud contexts
Preferred
3 Years Preferred – GSEC, CEH, CISA, CCSP
3 years Preferred – Certification as an AWS Solutions Architect, Cloud Security Certification, and/or OpenStack Administrator Certification a plus (other cloud-related certifications also a plus)
3 years Preferred – Experience with Endpoint Detection and Response tools (e.g., EndGame, CrowdStrike, CyberReason)
3 years Preferred – Experience with Email Threat Management tools (e.g., Proofpoint, MimeCast, Microsoft)
3 years Preferred – Experience with SIEM platforms (e.g., Splunk, Rapid7, SumoLogic)
3 years Preferred – Experience with Data Loss Prevention / Cloud Access Security Brokers (e.g., Symantec, Microsoft, Bitglass, Netskope)
3 years Preferred – Experience with Cloud Enterprise Network Security tools (e.g., Cisco Umbrella, Palo Alto, ZScaler)