C002914 Threat Hunting Analyst (NS) - WED 27 SEP RELAUNCH
Mons, Wallonia, Belgium
NOTE: Previously proposed candidates were non-compliant for the following reasons: - not a single candidate matched the mandatory experience requirement.
Deadline Date: Wednesday 27 September 2023
Requirement: Threat Hunting Analyst
Location: Mons, BE
Full time on-site: Yes
Not to Exceed Rate: 106 EUR
Total Scope of the request (hours): 315
Required Start Date: 6 November 2023
End Contract Date: 31 December 2023
Required Security Clearance: NATO SECRET
Specific Working Conditions: Normal office environment with standard working hours, but may exceptionally be required to work non-standard hours in support of a major Cyber Incident, or on a shift system for a limited period of time due to urgent operational needs.
Duties and Role:
As a Cyber Security Threat Hunting Analyst the incumbent will work alongside a team of Security Analysts to proactively detect cyber security attacks against NATO networks. They will research and and react to the latest threats, using industry leading tools to discover new and ongoing attacks.
Main responsibilities:
- Provide subject matter expertise supporting the end-to-end threat hunting process.
- Develop hypotheses to be used in a threat hunt for given threat groups.
- Create security tool content such as searches, reports and dashboards to facilitate threat hunting.
- Perform indepth analysis to deliver conclusions and recommendations.
- Review and develop logging configurations to enable a comprehensive threat hunting capability.
- Develop and document threat hunting procedures.
- Document analysis, findings, and recommendations in reports and presentations to be delivered to stakeholders.
- Tasks in support of NATO network monitoring and other NCSC Operations branch activities.
Requirements
Skill, Knowledge & Experience:
- The candidate must have a currently active NATO SECRET security clearance
- A university degree at a nationally recognised/certified University in a technical subject with substantial Information Technology (IT) content and two years of specific experience. Exceptionally, the lack of a university degree may be compensated by the demonstration of a candidate's particular abilities or experience that is/are of interest to NCI Agency; that is, at least 4 years extensive and progressive expertise in the duties related to the function of the post.
Mandatory Requirements
- Comprehensive knowledge of the principles of computer and communications security, networking, and the vulnerabilities of modern operating systems and applications.
- Experience in analysis of threat actor group attack patterns, tactics, techniques, and procedures (TTPs).
- Knowledge of the TaHiTI threat hunting methodology and the MITRE ATT&CK framework.
- Strong analytical and problem-solving abilities, ability to identify patterns, detect anomalies and make accurate, informed decisions.
- Experience in performing indepth cyber security analysis in large, complex networks using security use cases, relevant datasets, and documentation.
- Expertise in at least three of the following areas and a high level of experience in several of the other areas: Cyber security threat hunting; Security Information and Events Management systems (SIEM) – e.g. Splunk; Splunk processing language; Network and host based intrusion detection systems; Sysmon configuration, Windows, and Linux log analysis; Full Packet Capture systems (FPC) – e.g. Niksun, RSA/NetWitness; Data visualisation and statistical analysis; Technical report writing
- Good written and verbal communication skills (English)
Desirable
- A good understanding of Security, Orchestrations, Automation and Response (SOAR) concepts and their benefits to the protection of CIS infrastructures.
- Strong knowledge of malware families and network attack vectors.
- Experience in intrusion detection and incident handling.
- Ability to analyse attack vectors against a particular system to determine attack surface.
- Industry leading certification in the area of cyber security such as GCFA, GCIA, GNFA.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Automation Clearance GCFA GCIA GNFA Intrusion detection Linux Log analysis Malware MITRE ATT&CK Monitoring NATO RSA Security analysis Security Clearance SIEM SOAR Splunk TTPs Vulnerabilities Windows
Perks/benefits: Startup environment Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.