Military Fellowship – Network Security Threat Hunter
Company | Verizon Communications |
---|---|
Location | Ashburn, VA, USA, Southlake, TX, USA |
Salary | $Not Provided – $Not Provided |
Type | Full-Time |
Degrees | Bachelor’s |
Experience Level | Mid Level, Senior |
Requirements
- Must be a current participant of the Department of Defense Skillbridge Program or of the Hiring our Heroes Corporate Fellowship Program.
- Bachelor’s degree or four or more years of work experience.
- Three or more years of relevant experience required, demonstrated through work experience and/or military experience.
- Two years of experience in cyber security or information technology.
- Two years of experience conducting Cyber Security investigations.
- Two years of experience working with SIEM Security Tools.
- Two years of experience with system, application, and network logs.
Responsibilities
- Conducting threat hunting operations in Verizon’s most complex and critical network environments.
- Analyzing log data to detect active threats within the network using knowledge of the current threat landscape, threat actor techniques, and the internal network.
- Performing advanced threat research to proactively identify potential threat vectors and work with network and security teams to improve prevention and detection methods.
- Leveraging Verizon’s collected data to find indicators of compromise.
- Developing expertise on the Verizon threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Verizon threat landscape.
- Coordinating with multidisciplinary teams across network organizations to iteratively improve security controls and detection capabilities.
- Conducting time-sensitive analysis during cyber investigations, including active threat hunting and malware analysis.
- Analyzing malicious code, packet capture files, and artifacts.
- Identifying gaps in logging capabilities and developing and proposing strategies to fill gaps.
- Identifying and proposing automated alerts for new and previously unknown threats.
- Collaborating with teams across the Cyber organization to mitigate risk by testing, deploying, and developing investigative playbook.
Preferred Qualifications
- Basic understanding of network device events, Netflow, and BGP data.
- Three or more years of experience with incident response, security operations, malware analysis, or threat hunting.
- Three or more years of experience with application of data science concepts and techniques to enable advanced threat detection.
- Three or more years of experience with Red Teaming or Penetration Testing tools and techniques.