Tyto Athene, LLC

Cyber Threat Analyst

Tyto Athene, LLC

full-time

Posted on:

Location Type: Hybrid

Location: WashingtonDistrict of ColumbiaWashingtonUnited States

Visit company website

Explore more

AI Apply
Apply

Job Level

About the role

  • Actively hunt for Indicators of Compromise (IOC) and APT Tactics, Techniques, and Procedures (TTP) in the network and in the host as necessary
  • Search network flow, PCAP, logs, and sensors for evidence of cyber-attack patterns, and hunt for Advanced Persistent Threats (APT)
  • Create detailed Incident Reports and contribute to lessons learned in collaboration with the appropriate team
  • Collaborate with the SOC and Threat Analysts to contain and investigate major incidents
  • Provide simple and reusable hunt tactics and techniques to a team of security engineers, SIEM specialists, and SOC analysts
  • Work with leadership and the engineering team to improve and expand available toolsets
  • Analyze network perimeter data, flow, packet filtering, proxy firewalls, and IPS/IDS to create and implement a concrete plan of action to harden the defensive posture
  • Monitor open source and commercial threat intelligence for IOCs, new vulnerabilities, software weaknesses, and other attacker TTPs.

Requirements

  • 10 years of general experience and 8 years of relevant Cybersecurity experience
  • Experience with securing and hardening IT infrastructure
  • Demonstrated or advanced experience with computer networking and operating systems
  • Experience with operational security, including security operations center (SOC), incident response, malware analysis, or IDS and IPS analyses
  • Demonstrated proficiency with regular expression and scripting languages, including Python or PowerShell
  • Demonstrated proficiency with data hunting, including ELK, Splunk, Apache Spark, or AWS Stack
  • Familiarity with: Netflow data, DNS logs, Proxy Logs
  • Experience with network hunting, including Bro Logs, Netflow, PCAP, or PaloAlto firewalls and proxies
  • Knowledge of Windows and Linux OS’ and command line
  • Ability to analyze malware, extract indicators, and create signatures in Yara, Snort, and IOCs
  • Strong analytical skills and the ability to effectively research, write, communicate and brief varying levels of audiences to include at the executive level
  • Knowledge related to the current state of cyber adversary tactics and trends
  • Knowledge of the Splunk search language, search techniques, alerts, dashboards, and report building
  • Knowledge of the TCP/IP networking stack and network IDS technologies
  • Bachelor’s Degree in CS-related field preferred
  • Certifications Desired: CISSP, SANS GCTI, CCSP, GCFA, GCFE, GREM, GNFA, or OSCP Certification
Benefits
  • Health/Dental/Vision
  • 401(k) match
  • Paid Time Off
  • STD/LTD/Life Insurance
  • Referral Bonuses
  • professional development reimbursement
  • parental leave
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
Indicators of Compromise (IOC)Advanced Persistent Threats (APT)Incident Reportsnetwork flow analysisPCAP analysismalware analysisregular expressionPythonPowerShelldata hunting
Soft Skills
analytical skillscommunicationcollaborationresearchwritingbriefing
Certifications
CISSPSANS GCTICCSPGCFAGCFEGREMGNFAOSCP