monitor_heart
  
Dashboard

Sr Cyber Threat Hunter Resume

Posted: 12/2/2024 | Ref: #84797
Location Status Alameda, CA
Work Environment
Target Salary Negotiable
Category Information Technology

Candidate Pitch:

Technically sophisticated Cyber Security Professional with 7 years of experience in SOC Analysis, Threat Hunting, Threat Intelligence and Incident Response. Experience includes working with Four SIEMs (ArcSight, Splunk, SumoLogic, Securonix), Two EDRs (FireEye, CrowdStrike), Two Vulnerability Assessment tools (Qualys, Rapid7), Firewall (Checkpoint), SOAR (SIEMPLIFY, Palo Alto Networks Cortex XOAR), Email monitoring tools (Proofpoint) and CTI (Flashpoint, ThreatConnect, CybelAngel). The day-to-day job responsibilities include but are not limited to: • Threat Hunting and Incident Response – Includes but is not limited to monitoring Threat Intelligence platforms, Incident Response, RTR, Host Containment, Implementing Hash, IP and Domain blocks, Hypothesis-based threat hunts, and working with the Cyber Threat Intelligence team to understand tactics, techniques, and procedures (TTP) of Threat Actors. Attending calls from Vulnerability Management (VM) Team for ongoing incidents for Internal Threat Hunting and Incident Response remediation.
🔒

What is a Privacy Pitch Resume?

This candidate has opted to keep their Personally Identifiable Information (PII) secure while actively searching for new opportunities. You are viewing their core qualifications and requirements. If their profile aligns with your needs, click Contact Candidate Securely below. We will route your message directly to their private inbox.

← Back to Resume Search