OVERVIEW
As the SOC Lead specialized in Threat Hunting and Threat Intel youll spearhead our proactive approach to cybersecurity This role is pivotal in identifying latent threats gathering intelligence on emerging risks and ensuring our organizations resilience against future threats Collaborating with a team of threat hunters and analysts the individual will be instrumental in shaping our threat landscape awareness and proactive security stance
RESPONSIBILITIES
- Directly supervise and mentor the Threat Hunting and Threat Intelligence team members ensuring alignment with organizational security goals
- Lead proactive threathunting operations to identify unknown threats within the organization
- Continuously monitor external threat intelligence sources to stay updated on emerging threats vulnerabilities and threat actor tactics techniques and procedures (TTPs)
- Collaborate with other security and IT teams within the organization to integrate threat intelligence into security tools and platforms
- Develop and maintain a threat intelligence framework and platform for the organization
- Coordinate with external threat intelligence providers communities and forums to exchange threat intelligence
- Enhance the capabilities in threat hunting through continuous training and the acquisition of relevant tools and technologies
- Lead the response to highprofile security incidents by providing realtime intelligence and context
- Ensure that threat intelligence is actionable and relevant to the organizations threat landscape
- Build and maintain threat models specific to the organization focusing on potential attack vectors
- Review and optimize the methodologies and techniques used in threat hunting
- Prepare and deliver regular reports to management detailing threat intelligence findings and proactive threathunting results
- Engage with peers in the industry to stay updated on best practices in threat hunting and intelligence
- Develop and maintain playbooks for common and emerging threat scenarios
- Educate other SOC teams and the broader organization on the latest threat trends and mitigation strategies
REQUIREMENTS
- Bachelors degree in Computer Science Information Security or related field (or equivalent experience)
- Advanced certifications such as GCFA GNFA CTI or other relevant certifications
- Proven experience in threat hunting and threat intelligence within a SOC environment
- Deep knowledge of threat intelligence platforms tools and frameworks
- Familiarity with threat intelligence sharing platforms like STIX/TAXII
- Indepth understanding of the latest threat actor TTPs and the broader threat landscape
- Ability to develop and maintain threat models and methodologies
- Proficiency in log analysis network traffic analysis and malware analysis
- Strong communication skills to articulate findings and intelligence to both technical and nontechnical stakeholders
- Experience with various operating systems network architectures and cloud environments
- Advanced analytical and problemsolving skills with the ability to think critically
- Ability to work collaboratively with multiple teams to integrate threat intelligence findings
- Commitment to continuous learning in the rapidly evolving cybersecurity landscape
- Strong ethical standards and integrity
Vertical
Technology
Remote Work
No