5+ years of experience
Concerned about your lack of experience? Learn More...
Employment Type:
Full time
Job Category:
Information Services
SOC Cyber Threat Expert
(This job is no longer available)
Grad Date

Not sure what types of jobs you are interested in?

Explore Jobs
Based on Your Education

Follow This Company

Job Description

Northbrook, IL

Prestigious Organization is seeking an experienced Threat Operations Hunter to perform intelligence-driven network defense supporting the monitoring and incident response capabilities. The role will involve analysis of large amounts of data from vendors and internal sources, including various indicator feeds, Splunk, and several threat intelligence tools, etc. The candidate will perform the functions of threat operations and hunting and serve as the liaison for Threat Intelligence on-site in the Security Operations Center, and mentor the incident handling, incident response, and forensics teams.

Primary Responsibilities:

  • Enhancing the Security Operations and Threat Intelligence workflow by redesigning process and approach to operationalize the sharing and utilization of actionable intelligence and indicators.
  • Assist in identifying (hunting) and profiling threat actors and TTPs.
  • Custom tool design to assist in analysis and investigation. (Related experience in programming, database, system administration, etc.)
  • Implementing integration/orchestration of existing security infrastructure and indicators.
  • Design and run custom analysis models on (centralized) security event information to discover active threats, including collaboration on the development of use cases when appropriate.
  • Perform as an Information Security SME in the following areas:

o Threat Intelligence

o Incident Response

o Log analysis (statistical modelling, correlation, pattern recognition, etc.)

o Microsoft platform (Server, Workstation, applications)

o Open Systems platforms (Linux, UNIX, VM Ware ESX)

o Web Application

o Networking (Firewalls, IDS/IPS, packet capture)

o Databases (Oracle, SQL Server, DB2, IMS)

o and others.

  • Providing mentorship and support to teammates with regard to Threat Intelligence, communication/rapport with other divisions and various levels of leadership, technical expertise, and career development.
  • Capable of identifying need & driving solutions, and providing guidance, in an autonomous manner.

Job Qualifications

  • Bachelors and/or Masters Degree in Engineering, Computers Science, or related field
  • 10+ years overall technical experience in either threat intelligence, incident response, security operations, or related information security field.
  • 5+ years experience in application design/engineering, including but not limited to programming/Scripting, Windows/Linux system administration, RDBMS/NoSQL database administration, etc.
  • 2+ years experience in penetration testing, ethical hacking, exploit writing, and vulnerability management
  • Deep understanding of common network and application stack protocols, including but not limited to TCP/IP, SMTP, DNS, TLS, XML, HTTP, etc.
  • Strong and recent experience with malware analysis and reverse engineering.
  • Advanced experience with security operations tools, including but not limited to:

o SIEM (eg Splunk, ArcSight)

o Indicator management (eg ThreatConnect)

o Link/relationship analysis (eg Maltego, IBM i2 Analyst Notebook)

o Signature development/management (eg Snort rules, Yara rules)

  • Broad experience with various common security infrastructure tools (NIDS, HIPS, EDR, etc.)
  • Excellent analytical and problem solving skills, a passion for research and puzzle-solving.
  • Expert understanding of large, complex corporate network environments
  • Strong communication (oral, written, presentation), interpersonal and consultative skills, especially in regard to white papers, briefs, and presentations.
  • Good organization and documentation skills
  • Leadership and mentorship skills

Desirable Skills

  • At least hobbyist experience in maker/hardware hacking, eg Raspberry Pi, Arduino, etc.
  • Experience with incident response workflow (or other case management ticketing ) tools such as RSA Archer, ServiceNow, Remedy, JIRA, Resilient, Best Practical Request Tracker, etc.
  • Obtained certifications in several of the following: SANS GIAC courses, CEH, CISSP, OSCP, or tool-specific certifications

Scripting experience related to system administration and security operations (Python, Bash, Powershell, Perl, C/C++)


Applicants must be eligible to work in the specified location