Tier 3 Cyber Security Analyst / Hunter

Location: Wilton, CT
Type of Work: Full Time

This job is being sought for a Full-time employment position with a supported client. 

Immediate opening for Tier-3 Cyber Security Analysts/Hunter to support Computer Incident Response Team for a Financial client’s Security Operations Center (SOC). Skills require 8+ years hands-on experience in detection, response, mitigation, and/or reporting of cyber threats affecting enterprise networks with the following additional requirements:

  • Experience in computer intrusion analysis and incident response
  • Intrusion detection
  • Computer network surveillance/monitoring
  • Knowledge and understanding of network protocols, network devices, multiple operating systems, and secure architectures
  • Experience in computer evidence seizure, computer forensic analysis, and data recovery
  • Computer network forensics
  • System log analysis; experience using Splunk
  • Experience and knowledge of current cyber threats and associated tactics, techniques, and procedures used to infiltrate computer networks.
  • Current experience with network intrusion detection and response operations (Protect, Defend, Respond and Sustain methodology)
  • Current experience with cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks
  • Demonstrated ability to document processes and add value to existing processes and procedures
  • Ability to respond to crises objectively
  • Proficiency with MS Office Applications, Archer, ServiceNow, or Jira/Confluence

The role will encompass the following duties in which the candidate must demonstrate relevant experience:

Incident Response Responsibilities

  • Participate/Lead investigation Phase of Incident Response
  • Live responses/forensics
  • Maintain ownership of all “unknown” variables and track down solutions

Non-Incident Response Responsibilities

  • Research
    • Adversary tactics, techniques, and procedures (TTPS)
    • Malware
    • Detection methods (signals generation)

Hunting Responsibilities

  • Development and formation of hypothesis development
  • Identification of data sources
  • Documenting deficiencies
  • Designing and executing hunt operations

Certification Minimum:

GSE +additional host-based training and certifications (to be reviewed upon request).

Applicants must have the minimum certification requirement(s) to be considered. 

Send resume to info@convergentmissions.com or use the form to get in contact with CMS.

Recent Tweets

RT @cpomagazine: Learn more about the different types of #DDoS attacks in a #cybercriminals arsenal. https://t.co/GhsGJ24bSE

4:35am Feb 16th

The ability of #AI to generate endless faces that don't exist, has up and downsides. #artificialintelligence https://t.co/Evx3eR4jcS

8:21pm Feb 15th



6:44pm Jan 31st

6:42pm Jan 31st

See how CMS can help your organization manage security initiatives and projects.

4:01pm May 15th

5:18pm Feb 17th

Here's a very good explanation of the newest malware threat DNS Changer. 

9:56pm Jul 7th

Here's a very good explanation of the newest malware threat DNS Changer. 

8:03pm Jul 7th

Want to know more about Information Security? Check out ISACA! It's a great place to start.

12:46pm Apr 28th

Panel 4 content goes here.

Our values translate to employees and supported clients.