Incident Response Threat Hunter

GBR, Cambridgeshire (Home), United Kingdom

Booz Allen Hamilton

Using tomorrow’s technologies, Booz Allen advances the nation’s most critical civil, defense, and national security missions.

View all jobs at Booz Allen Hamilton

Apply now Apply later

Incident Response Threat Hunter

The Opportunity:
Are you looking for threat hunter role in detecting cyber threats in support of active forensic investigations. Cyber threats are evolving, when perimeter security and automated protection aren’t enough networks are compromised, information is accessed, data is exfiltrated, backups are wiped and ransomware is deployed locking up an entire organisation. Are you looking to join our threat detection and response team in performing active threat hunting to assist organisations recover from cyber incidents.

We’re looking for CND/CNO specialists who can think like a cyber attacker to figure out how security measures were circumvented by threat actors. This is an opportunity to use your analytical skills and gain endpoint detection and response experience to identify indicators of compromise. You will work in concert with incident response analysts actively engaged in forensic investigations.

Join us. The world can't wait.

You Have:
 

  • Experience with EDR platforms, including Carbon Black, SentinelOne, CrowdStrike, Defender for Endpoint
  • Experience with conventional network- and host-based intrusion analysis, digital forensics, or handling malware
  • Experience with hunt teams, cyber threat intelligence, incident response, or security operations teams
  • Knowledge of security principles, including MITRE ATT@CK framework, threat landscapes, or attacker TTPs
  • Knowledge of Microsoft Windows, UNIX, and Mac
  • Knowledge on Security Tools in Application, Data, Networks, and Endpoint layers
  • Ability to leverage internal and external resources for research threats, vulnerabilities, and intelligence on various attackers and attack infrastructure
  • Ability to identify anomalous behavior on endpoint devices or network communications
  • HS diploma or GED

Nice If You Have:

  • Experience with digital forensics on host or network from a malware perspective
  • Knowledge of network communications, routing protocols, regulatory standards and compliance requirements, and common internet applications and standards
  • Knowledge on native system and network policies
  • Ability to identify anomalous behavior on network or endpoint devices
  • GIAC Reverse Engineering Malware (GREM), GIAC Certified Forensic Analyst (GCFA), GIAC Network Forensics Analyst (GNFA), Offensive Security, including OSCP and OSCE, or a related Certification

EEO Commitment

We’re an equal employment opportunity/affirmative action employer that empowers our people to fearlessly drive change – no matter their race, color, ethnicity, religion, sex (including pregnancy, childbirth, lactation, or related medical conditions), national origin, ancestry, age, marital status, sexual orientation, gender identity and expression, disability, veteran status, military or uniformed service member status, genetic information, or any other status protected by applicable federal, state, local, or international law.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  2  1  0

Tags: Carbon Black CND Compliance CrowdStrike DART EDR Forensics GCFA GIAC GNFA GREM Incident response Malware Offensive security OSCE OSCP Reverse engineering Threat detection Threat intelligence TTPs UNIX Vulnerabilities Windows

Region: Europe
Country: United Kingdom

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.