Sr. Threat Hunting Intelligence Analyst (Remote, West Coast)
adversary TTPs using the MITRE ATT&CK framework, and articulate findings to technical and non-technical audiences Exceptional...
adversary TTPs using the MITRE ATT&CK framework, and articulate findings to technical and non-technical audiences Exceptional...
, and IDS logs at scale. Incident Frameworks: Knowledge of NIST 800-61 and MITRE ATT&CK methodologies. Advanced Analytics...
in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework. About our Program: Through the J6...
informed and best decision Security Frameworks: Familiarity with MITRE ATT&CK, NIST, and other security frameworks...
. Apply frameworks such as MITRE ATT&CK, CVE data, and attacker kill chain analysis to contextualize threats and recommend mitigations... platforms Understanding of networking fundamentals and adversary tradecraft Knowledge of: MITRE ATT&CK Framework CVE...
(e.g., MITRE ATT&CK framework) Proficiency with data analytics platforms, such as Splunk, ELK Stack, Chronicle, Sentinel...
analysis, intrusion detection, behavioral analytics, cyber kill chain, MITRE ATT&CK framework, APT attribution, threat modeling...
. · Experience with log parsing tools (rsyslog, syslog-ng) and data normalization. · Familiarity with MITRE ATT&CK, threat hunting...
root cause analysis of security events and incidents Knowledgeable with security frameworks (E.g. – MITRE ATT&CK...
architecture, and endpoint protection Deep knowledge of security frameworks (NIST CSF, NIST 800-53, CIS Controls, MITRE ATT&CK...