Threat Hunting Lead
1 week ago
The world isn’t standing still, and neither is Allstate. We’re moving quickly, looking across our businesses and brands and taking bold steps to better serve customers’ evolving needs. That’s why now is an exciting time to join our team. You’ll have opportunities to take risks, challenge the status quo and shape the future for the greater good.You’ll do all this in an environment of excellence and the highest ethical standards – a place where values such as integrity, inclusive diversity and accountability are paramount. We empower every employee to lead, drive change and give back where they work and live. Our people are our greatest strength, and we work as one team in service of our customers and communities.Everything we do at Allstate is driven by a shared purpose: to protect people from life’s uncertainties so they can realize their hopes and dreams. For more than 89 years we’ve thrived by staying a step ahead of whatever’s coming next – to give customers peace of mind no matter what changes they face. We acted with conviction to advocate for seat belts, air bags and graduated driving laws. We help give survivors of domestic violence a voice through financial empowerment. We’ve been an industry leader in pricing sophistication, telematics, digital photo claims and, more recently, device and identity protection.We are the Good Hands. We don’t follow the trends. We set them. Job SummaryAllstate Information Security (AIS) is responsible for managing cyber security at Allstate. This includes Governance/Risk/Compliance, Access Management, Network Security, and Threat Response Services. AIS is responsible for ensuring confidentiality, integrity, and availability of Allstate systems.We are seeking an experienced Threat Hunter to perform intelligence-driven network defense supporting the monitoring and incident response capabilities. The role will involve analysis of large amounts of data from vendors and internal sources, including various indicator feeds, Splunk, and several threat intelligence tools, etc. This individual will perform the functions of threat hunting and serve as a liaison for Threat Services for the Global Security Fusion Center, and mentor the incident handling and forensics teams. Key Responsibilities Design and run custom analysis models on security event information to discover active threats Identify (hunting) security nuances and abnormalities in the environment Develop use cases and actionable content to identify security issues that are currently not alerted within the environment Lead projects and assignments Provide custom tool design to assist in analysis and investigations Perform as an Information Security resource in three or more of the following areas: Threat Intelligence Incident Response Log analysis (statistical modeling, correlation, pattern recognition, etc.) Microsoft platform (Server, workstation, applications) Open Systems platforms (Linux, UNIX, VM Ware ESX) Web Application Networking (firewalls, IDS/IPS, packet capture) Databases (Oracle, SQL Server, DB2, IMS) SIEM Reverse Engineering / Malware analysis Collaborate and support teammates and outside teams with regard to threat hunting techniques/issues Communication/build rapport with other divisions and various peers Identify needs, drive solutions, and provide guidance in an autonomous manner Job Qualifications Bachelors and/or Masters Degree in IT Security, Engineering, Computers Science, or related field/experience 7+ years overall technical experience in threat hunting, threat intelligence, incident response, security operations, or related information security field 2+ years experience in penetration testing, ethical hacking, exploit writing, and/or vulnerability management Deep understanding of common network and application stack protocols, including but not limited to TCP/IP, SMTP, DNS, TLS, XML, HTTP, etc. Advanced experience with security operations tools, including but not limited to: SIEM (e.g. Splunk, ArcSight) Network analysis (e.g. Net Witness, Palo Alto) Signature development/management (e.g. Spunk rules, Snort rules, Yara rules) EDR solutions (e.g. CrowdStrike, Tanium) Link/relationship analysis (e.g. Maltego, IBM i2 Analyst Notebook) Broad experience with various common security infrastructure tools (NIDS, HIPS, EDR, etc. Scripting experience related to system administration and security operations (Python, Bash, PowerShell, Perl, C/C++) Excellent analytical and problem-solving skills, a passion for research and puzzle-solving Strong communication (oral, written, presentation), interpersonal and consultative skills Leadership and mentorship skills Additional Desirable Criteria Experience hunting in AWS and/or Azure environments Deep understanding of large, complex corporate network environments Strong knowledge or experience in penetration testing, ethical hacking, exploit writing, and/or vulnerability management Knowledge or experience in application design/engineering, including but not limited to programming/scripting, Windows/Linux system administration, RDBMS/NoSQL database administration, etc. Recent experience with malware analysis and reverse engineering Obtained certifications in several of the following: SANS GIAC courses, CEH, CISSP, OSCP, or tool-specific certifications
-
US FL JAX FIS Capital Markets Full time $96,000 - $144,000 per yearJob DescriptionFIS Management Services, LLC seeks IT Security Analyst Seniors – Cyber Threat Hunting in Jacksonville, FL to be responsible for leveraging specialized knowledge of FIS technologies to execute security controls to prevent hackers from infiltrating company information or jeopardizing programs. Research attempted efforts to compromise security...
-
Lead Adversarial Security Engineer
1 week ago
Remote, United States Trellix Full timeRole Overview:As a lead member of the security operations team, and reporting to the Deputy CISO the mission of this role is to bridge the gap between "what if" and "what is" to continuously test the organization's defenses, find gaps, and personally lead the engineering effort to close them. By collaborating with the Security Operations Center (SOC), Threat...
-
remote, us GHX Full timeWe’re looking for a security-minded, hands-on leader with extensive Incident Response (IR) and Threat Intelligence experience to support our global 24x7 security monitoring and IR programs. The candidate must be an experienced incident response leader with a strong track record of coordinating cross-functional teams (Compliance, Legal, HR, Corporate IT,...
-
Security Specialist
2 weeks ago
remote, remote, United States Sapphire Health Full timeSecurity Specialist – Sapphire Operations CenterAbout Sapphire Health: At Sapphire Health, we're at the forefront of protecting healthcare technology and sensitive patient data. Our Security Operations team plays a crucial role in safeguarding the digital infrastructure that enables healthcare providers to deliver exceptional patient care. We combine...
-
Technical Customer Success Manager
4 days ago
Remote, Oregon, United States iVerify Full time $140,000 - $220,000 per yearAbout iVerifyWe are Experts in Mobile Threat Hunting. The first mobile threat hunting company to protect mobile devices like any other vulnerable corporate endpoint.The mobile security market has a problem. Simply put, current solutions fail to meet the sophistication of modern threats or the growing privacy desires of mobile device users. We believe that it...
-
Remote Cyber Security Senior Manager
2 weeks ago
Remote, United States Exponent Full timeA leading technology consultancy in Seattle is looking for a Cyber Security Senior Manager (Ph.D.) to oversee cyber security consulting and threat mitigation for clients. If the following job requirements and experience match your skills, please ensure you apply promptly. The role requires extensive experience in security and a strong network. Ideal...
-
National Accounts Sales Manager- REMOTE
4 weeks ago
Remote, United States Palo Alto Networks Full timeManaged Threat Detection Manager (Unit 42 MDR) - Remote Managed Threat Detection Manager (Unit 42 MDR) - Remote 2 days ago Be among the first 25 applicants Get AI-powered advice on this job and more exclusive features. Ensure all your application information is up to date and in order before applying for this opportunity. At Palo Alto Networks...
-
remote, us Epam Full timeDescription We are actively seeking a Senior Cyber Defense Analyst to join our team and play a pivotal role in analyzing complex data sets to identify and mitigate potential cyber threats. With a deep understanding of cyber defense principles and practices, you will utilize data analytics tools and techniques to detect patterns and anomalies in security...
-
Cyber Incident Response Analyst
4 days ago
Remote, Oregon, United States Lams Technology LLC Full time $60,000 - $120,000 per yearJob Title: Incident Response & Preparedness (IRP) EngineerLocation: RemoteEmployment Type: Full-Time / ContractDepartment: Cybersecurity / Security Operations / GRCPosition OverviewThe Incident Response & Preparedness (IRP) Engineer will lead the design, development, and operational readiness of the organization's incident response program, processes,...
-
Lead Application Security Engineer
1 week ago
remote, us Epam Full timeDescription We are in search of a Lead Application Security Engineer to become a part of our team. The preferred candidate should possess a background in software development along with substantial experience in application security. In this role, you will be accountable for overseeing the application security program for a worldwide investment company. In...