Military Fellowship - Network Security Threat Hunter
About the position
Responsibilities
• Conducting threat hunting operations in Verizon's most complex and critical network environments.
• Analyzing log data to detect active threats within the network using knowledge of the current threat landscape, threat actor techniques, and the internal network.
• Performing advanced threat research to proactively identify potential threat vectors and work with network and security teams to improve prevention and detection methods.
• Leveraging Verizon's collected data to find indicators of compromise.
• Developing expertise on the Verizon threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Verizon threat landscape.
• Coordinating with multidisciplinary teams across network organizations to iteratively improve security controls and detection capabilities.
• Conducting time-sensitive analysis during cyber investigations, including active threat hunting and malware analysis.
• Analyzing malicious code, packet capture files, and artifacts.
• Identifying gaps in logging capabilities and developing and proposing strategies to fill gaps.
• Identifying and proposing automated alerts for new and previously unknown threats.
• Collaborating with teams across the Cyber organization to mitigate risk by testing, deploying, and developing investigative playbooks.
Requirements
• Must be a current participant of the Department of Defense Skillbridge Program or of the Hiring our Heroes Corporate Fellowship Program.
• Bachelor's degree or four or more years of work experience.
• Three or more years of relevant experience required, demonstrated through work experience and/or military experience.
• Two years of experience in cyber security or information technology.
• Two years of experience conducting Cyber Security investigations.
• Two years of experience working with SIEM Security Tools.
• Two years of experience with system, application, and network logs.
Nice-to-haves
• Basic understanding of network device events, Netflow, and BGP data.
• Three or more years of experience with incident response, security operations, malware analysis, or threat hunting.
• Three or more years of experience with application of data science concepts and techniques to enable advanced threat detection.
• Three or more years of experience with Red Teaming or Penetration Testing tools and techniques.
Apply tot his job
Apply To this Job