✔Talent Acquisition ✔ Expertise in Hiring Best Talent ✔ Niche Skill Hiring ✔ Volume/ Mass Hiring ✔ Technical Recruiter ✔ - Connections Target - 30k+ on LinkedIn
Hiring!! Hiring!! Hiring!! Dear Folks, We have an urgent Opening with one of our TOP MNC Client for Threat Hunter / Threat Hunting / Threat Intel/ MITRE ATT&CK role. Please find the below Job Description: Skill- Threat Hunter / Threat Hunting/ Threat Intel/ MITRE ATT&CK Mumbai location- 5 days - WFO - 5-8 YEARS Any Location _ Hybrid_ 5-12 years The candidate will work closely with Onshore & offshore team on the Threat Intelligence & hunting activities. This includes developing methodologies for Threat intelligence. Analyze, develop & disseminate indicators of compromise (IOCs), launch Threat Hunting campaigns based on Industry adopted best practices based on MITRE ATT&CK framework & others. Mandatory Skills 1. Minimum 7 to 10 years of experience in Threat Intelligence & Hunting 2. Experienced in discovering and gathering Threat data from intelligence feeds 3. Prior experience of developing methodologies for threat data mining to uncover the threat actors and threat vectors 4. Experienced in maintaining, developing, and continuously evaluating cyber threat intelligence, & threat intelligence/data sources 5. Maintain an understanding of the overall threat landscape (cyber, malware, botnets, phishing, DDoS, physical) applicable to Carrier 6. Collect, analyze, investigate, store, and disseminate indicators of compromise (IOCs) 7. Regularly develop and produce written cyber, brand and threat intelligence reports 8. Provide support to the Security Incident Response Team and SOC in the effective detection, analysis, and containment of attacks, as well as researching potential IOCs and linking to intelligence 9. Draft, edit, and disseminate threat intelligence information/briefs to stakeholders, executive leadership, and others 10. Monitoring of security procedures and practices; recommend optimizations and improvements when gaps are identified 11. Collaborate with Monitoring and Incident Response team & Content Engineering team to build proactive detection logic for threat detection 12. Assist the SOC Monitoring & IR team in analysis and resolution of Major incidents. 13. Leverage Threat Intelligence gathered to execute Threat Hunting campaigns. Following types of Threat Hunting campaigns will be executed – o Threat Indicator driven threat hunting o Hypotheses driven threat hunting o MITRE ATT&CK framework driven hunting campaigns Interested folks can share your profile at payel.maity@alikethoughts.com #threathunting #threatintel #threathunter #mitreattack #Cybersecurity #hiringalert