Tier 3 Cyber Security Analyst / Hunter

Location: Wilton, CT
Type of Work: Full Time

This job is being sought for a Full-time employment position with a supported client. 

Immediate opening for Tier-3 Cyber Security Analysts/Hunter to support Computer Incident Response Team for a Financial client’s Security Operations Center (SOC). Skills require 8+ years hands-on experience in detection, response, mitigation, and/or reporting of cyber threats affecting enterprise networks with the following additional requirements:

  • Experience in computer intrusion analysis and incident response
  • Intrusion detection
  • Computer network surveillance/monitoring
  • Knowledge and understanding of network protocols, network devices, multiple operating systems, and secure architectures
  • Experience in computer evidence seizure, computer forensic analysis, and data recovery
  • Computer network forensics
  • System log analysis; experience using Splunk
  • Experience and knowledge of current cyber threats and associated tactics, techniques, and procedures used to infiltrate computer networks.
  • Current experience with network intrusion detection and response operations (Protect, Defend, Respond and Sustain methodology)
  • Current experience with cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks
  • Demonstrated ability to document processes and add value to existing processes and procedures
  • Ability to respond to crises objectively
  • Proficiency with MS Office Applications, Archer, ServiceNow, or Jira/Confluence

The role will encompass the following duties in which the candidate must demonstrate relevant experience:

Incident Response Responsibilities

  • Participate/Lead investigation Phase of Incident Response
  • Live responses/forensics
  • Maintain ownership of all “unknown” variables and track down solutions

Non-Incident Response Responsibilities

  • Research
    • Adversary tactics, techniques, and procedures (TTPS)
    • Malware
    • Detection methods (signals generation)

Hunting Responsibilities

  • Development and formation of hypothesis development
  • Identification of data sources
  • Documenting deficiencies
  • Designing and executing hunt operations

Certification Minimum:

GSE +additional host-based training and certifications (to be reviewed upon request).

Applicants must have the minimum certification requirement(s) to be considered. 

Send resume to info@convergentmissions.com or use the form to get in contact with CMS.

Recent Tweets

CMS effectively manages networks with varying levels of layered security or defense in depth to proactively identif… https://t.co/y8q0ApWynx

5:40pm Apr 24th

Hey Absolute Civ Sec🇺🇸(@1RACHACSECURITY), thank you for following me

3:42pm Apr 24th

Connect

captcha

CMS understands the importance of situational awareness, two-way communication, and custom organizational processes for responding to network security issues and managing critical resources. Get your maximum return on investment.

5:06pm Apr 24th

The development of real cyberinsurance, like health insurance, is going to be expensive, but it can also provide incentives for improving cybersecurity. Just as medical and life insurance policies offer discounts for people who don’t smoke or keep healthy regimens, cyberinsurance policies could do the same for corporations that maintain “good hygiene” or follow “best practices” in computer security. Our values translate to employees and supported clients - how can we help with your cybersecurity needs?

2:27pm Apr 24th

CMS support programs and tools provide layered security and defense in depth. This is the solution for keeping your operation running smoothly and sustainably in the future. Learn more:

10:57pm Apr 23rd

Under the current version of the Cybersecurity Act, “Cybersecurity” means any measure or procedure established to prevent, handle, and/or mitigate the risk of Cyber Threats from both inside and outside the country, which affect national security, economic security, martial security, and public order. Our values translate to employees and supported clients - how can we help with your cybersecurity needs?

2:27pm Apr 23rd

Panel 4 content goes here.

Our values translate to employees and supported clients.