< Back to all results

June 4

US Citizen or Green Card Only.

Who We Are

we are redefining cybersecurity and are one of the fastest growing companies in the U.S. (Top 50 based on last year s Inc5000). we serves an impressive list of Fortune 50 and Global 2000 companies as well as numerous mid-sized enterprises. We ve established strategic partnerships with leading security vendors and serve as a trusted advisor to our customers. Our Core Values drive all aspects of the business and have been paramount to the company s success and foster our dynamic, entrepreneurial workplace. Your colleagues are some of the most technically astute minds in cybersecurity, who are passionate, knowledgeable, and willing to provide mentorship and guidance at every opportunity.

Our next generation Managed Security Services (MSSP) solution is redefining the industry. If you have the passion, work ethic, winning attitude and competitive mindset to be at the forefront of the best entrepreneurial MSSP in the U.S., we want you on our team.

We Offer

Knowledgeable and skilled colleagues seeking collaboration

We pay 100% of our employees health, dental, life & disability insurance premiums and a generous portion for dependents

We provide access to competitive 401k retirement plans upon eligibility

Paid Time Off

10 Company Holidays

Most positions allow for some amount of telework and flextime, enabling our employees to manage work & life

All employees enjoy a generous mobile phone and home internet allowance

Apple products

Robust referral bonus program

Career paths

Training & Development opportunities

Splunk (SIEM) Engineer

Threat Hunters are focused on providing predictive analysis. The questions and issues they face will be to accurately forecast coming threats, to be on the cutting edge of research and their chosen specialization. They are responsible for getting actionable intelligence to the Detect team at large for developing tools and techniques for more efficient and effective monitoring, analysis, and response. Hunters are proactive and actively pursue threats in client environments as well as identifying them in the wild.

Responsibilities

Leverage the SIEM for tracking anomalous activity and seeking malicious actors

Incident Response support and threat hunting in client environments

Validate suspicious events and incidents by using open-source and proprietary intelligence sources

Document new tools and techniques and disseminate them to the rest of the team

Document and manage incident cases in our case management system

Report incidents to the customer using a ticketing system

Interface with customers to resolve issues, provide additional information, and answer questions related to incidents and monitoring

Triage support requests and helpdesk queue to maintain SLA

Work an 8-hour shift as needed and directed to provide coverage for customer environments

Keep up-to-date with information security news, techniques, and trends

Identify and report any gaps in log collection or reporting as soon as possible to the customer and vSOC Engineering

Report any changes in customer environments to the Lead Analyst

Produce content regarding new threats, techniques and information for internal and external consumption

Perform Reputation and Brand analysis, credential dump monitoring and client environment tuning

Assist in Natural Disaster Planning and Alerting

Risk and Threat Assessment and Planning (Threat Modeling)

To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

Required Experience

Expertise in Information Security (Required)

Strong communication skills written and oral (Required)

Experience with Splunk (Required)

Experience with Incident Management and Response (Required)

Experience writing and communicating with customers (Required)

Degree in Information Security or Information Technology (Desired)

Demonstrate Subject Matter Expertise (SME) in at least one of the following areas:

Digital Forensics & Incident Response (DFIR)

Malware/Reverse Engineering

Network

Hunting/Threat Intelligence

Operating Systems

Web Application Security

Integrated Control Systems

Attacker Methodology

Apply

September 8

September 2

August 26

August 24

August 21

August 16

View all recent jobs