Sr Cyber Threat Hunter Resume
Location Status
Alameda, CA
Work Environment
Target Salary
Negotiable
Category
Information Technology
Candidate Pitch:
Technically sophisticated Cyber Security Professional with 7 years of experience in SOC Analysis, Threat Hunting, Threat Intelligence and Incident Response. Experience includes working with Four SIEMs (ArcSight, Splunk, SumoLogic, Securonix), Two EDRs (FireEye, CrowdStrike), Two Vulnerability Assessment tools (Qualys, Rapid7), Firewall (Checkpoint), SOAR (SIEMPLIFY, Palo Alto Networks Cortex XOAR), Email monitoring tools (Proofpoint) and CTI (Flashpoint, ThreatConnect, CybelAngel). The day-to-day job responsibilities include but are not limited to: • Threat Hunting and Incident Response – Includes but is not limited to monitoring Threat Intelligence platforms, Incident Response, RTR, Host Containment, Implementing Hash, IP and Domain blocks, Hypothesis-based threat hunts, and working with the Cyber Threat Intelligence team to understand tactics, techniques, and procedures (TTP) of Threat Actors. Attending calls from Vulnerability Management (VM) Team for ongoing incidents for Internal Threat Hunting and Incident Response remediation.What is a Privacy Pitch Resume?
This candidate has opted to keep their Personally Identifiable Information (PII) secure while actively searching for new opportunities. You are viewing their core qualifications and requirements. If their profile aligns with your needs, click Contact Candidate Securely below. We will route your message directly to their private inbox.