Posted in

Military Fellowship – Network Security Threat Hunter

Military Fellowship – Network Security Threat Hunter

CompanyVerizon Communications
LocationAshburn, VA, USA, Southlake, TX, USA
Salary$Not Provided – $Not Provided
TypeFull-Time
DegreesBachelor’s
Experience LevelMid Level, Senior

Requirements

  • Must be a current participant of the Department of Defense Skillbridge Program or of the Hiring our Heroes Corporate Fellowship Program.
  • Bachelor’s degree or four or more years of work experience.
  • Three or more years of relevant experience required, demonstrated through work experience and/or military experience.
  • Two years of experience in cyber security or information technology.
  • Two years of experience conducting Cyber Security investigations.
  • Two years of experience working with SIEM Security Tools.
  • Two years of experience with system, application, and network logs.

Responsibilities

  • Conducting threat hunting operations in Verizon’s most complex and critical network environments.
  • Analyzing log data to detect active threats within the network using knowledge of the current threat landscape, threat actor techniques, and the internal network.
  • Performing advanced threat research to proactively identify potential threat vectors and work with network and security teams to improve prevention and detection methods.
  • Leveraging Verizon’s collected data to find indicators of compromise.
  • Developing expertise on the Verizon threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Verizon threat landscape.
  • Coordinating with multidisciplinary teams across network organizations to iteratively improve security controls and detection capabilities.
  • Conducting time-sensitive analysis during cyber investigations, including active threat hunting and malware analysis.
  • Analyzing malicious code, packet capture files, and artifacts.
  • Identifying gaps in logging capabilities and developing and proposing strategies to fill gaps.
  • Identifying and proposing automated alerts for new and previously unknown threats.
  • Collaborating with teams across the Cyber organization to mitigate risk by testing, deploying, and developing investigative playbook.

Preferred Qualifications

  • Basic understanding of network device events, Netflow, and BGP data.
  • Three or more years of experience with incident response, security operations, malware analysis, or threat hunting.
  • Three or more years of experience with application of data science concepts and techniques to enable advanced threat detection.
  • Three or more years of experience with Red Teaming or Penetration Testing tools and techniques.