Share this Job

Sr Cyber Security Threat Hunter

Date: Jul 18, 2022

Location: Muntinlupa City, National Capital Region (NCR), PH, 1781

Company: W. R. Grace & Co.

Job Description

We are seeking a highly motivated technical threat hunter with an investigative and adversarial mindset to help us proactively identify nefarious activities and behaviors, insider threats and security issues that could exist within Standard Industries (SI) and its operating companies.

The Threat Hunter will identify threats by leveraging threat intelligence, knowledge of attackers, tactics, techniques, and procedures (TTPs) and access to SI’s cyber security tools stack and resources, in order to identify and disrupt attacks while consistently improving detection capabilities.

The ideal candidate will work closely with the internal Red Team, managed service providers, covering Managed Detection & Response (MDR), Managed Security Service Provider (MSSP), and Incident Response (IR) in order to detect and deter actionable security events. This position will report into the Manager of Security Operations.

Responsibilities

  • Perform pattern, trend, and behavioral analysis leveraging logs, access to systems and networks, as well as other specialized analysis techniques to proactively identify malicious cyber threat activities within our networks and systems
  • Create proactive detection content to support automated identification of malicious activity and threats across the environment
  • Maintain records to catalog and track malicious cyber threat activity
  • Liaise with members of the Intelligence Community
  • Contribute to executive summary reports where intelligence-driven data will be delivered

Required Qualifications

  • 5-7 years in a cybersecurity threat hunting, Security Operations Center (SOC) or in a related cybersecurity organization role
  • Any industry-recognized Information Security accreditation (GCIA, GCFA, GCTI, GNFA) or equivalent experience
  • Strong knowledge of MITRE ATT&CK and Cyber Kill Chain frameworks and methodologies
  • Knowledge working with Endpoint Detection and Response (EDR)
  • Experience of cyber-security technical analysis gained in an in-house security operations team or within an MSSP delivery 
  • Strong understanding of how Windows, MacOS and Linux operating systems function
  • Strong understanding of IT and cloud networks and technologies 
  • Experienced in the analysis of raw logging and SIEM data 
  • Development of custom security alerting within SIEM and EDR tooling 
  • In-depth technical knowledge of current cyber-security issues and threat management
  • Excellent problem-solving ability
  • Strong communication skills
  • Excellent analytical skills and ability to analyze security requirements 
  • Must be amenable to shifting schedules.