Threat Hunter in Houston, TX at Volt

Date Posted: 11/2/2018

Job Snapshot

  • Employee Type:
    Direct Hire
  • Location:
    Houston, TX
  • Job Type:
  • Duration:
    N/A
  • Date Posted:
    11/2/2018
  • Job ID:
    146335
  • Contact Name
    Volt Branch
  • Phone
    512/592-3354

Job Description

DIRECT HIRE
Calling all Cybersecurity Professionals/Threat Hunters!!! Are you looking to advance your technical knowledge and take your career to the next level, with an innovative client?   

Do you have the ability to protect systems from criminal activity - specifically breach or ransomware attack? 

Do you have prior experience with validating security and detective controls through hands-on red team penetration testing exercises on the business and process control networks?

Do you have experience with Carbon Black and Splunk will to assist with your hunting?

Then this might be the opportunity for you!!!

Threat Hunter (cybersecurity)

Houston, TX

DIRECT HIRE ONLY

$85-110k

Interview/Start ASAP

Description

The Threat Hunter reports to the Information Security Officer and while it has many responsibilities, the primary focus is to protect the systems from criminal activity - specifically breach or ransomware attack.  Daily activities will center around detecting and responding to suspicious and/or criminal activity. This position will also validate security and detective controls through hands-on red team penetration testing exercises on the business and process control networks. Think Metasploit, PowerShell Empire, and custom scripts written by you and members of the team.

You'll work with state-of-the-art suspicious activity detection, incident response, penetration testing and forensic technologies, using commercial and open source solutions.  You will also receive significant training - both daily hands on activities and through SANS or other leading cybersecurity training providers.

Requirements:

  • Previous experience Investigating cybersecurity alerts on both the Business and ICS networks. 
  • Performed initial triage, live response, and containment.
  • Determined root cause.
  • Tuned false positives.
  • Performed regular adversary simulation activities which validate existing security controls can detect threat actor activity including exploitation, credential compromise, lateral movement, or attempts to interact with critical systems and devices.
  • Actively tracked nation state and cybercriminal actors, including their methods of credential compromise, persistence/deployment, and lateral movement inside Business and ICS networks.  
  • Created new watchlists and alerts to detect this activity.
  • Documented investigations, findings, prepared formal reports, security requirements, and centrally tracked incident response activities. 
  • Created and updated ICS incident playbooks.

Reach out today and let’s get the conversation started.  Brian Keane (512) 592-3354 or bkeane@volt.com

Volt is an Equal Opportunity Employer!!