Epicareer Might not Working Properly
Learn More

Cybersecurity Training & Cybersecurity Threat Hunting Analyst - Fulltime - Dallas, TX

Salary undisclosed

Checking job availability...

Original
Simplified
Cybersecurity Training & Awareness Analyst
Dallas, TX onsite
will work as part of the Cybersecurity organization to build, operate, and maintain a variety of programs designed to educate all levels of AA team members about key cyber threats with the goal of reducing risk across the organization.

Required Experience/knowledge

3+ years of experience with cybersecurity training and awareness; related college degree preferred

Experience with developing and operating multiple aspects of training & awareness programs e.g. training courses, formal communications, phishing campaigns, cyber ranges, etc.

Knowledge of cybersecurity domains, including policies, controls, and common regulatory requirements

Understanding of top human risks to an organization and programs designed to change behavior to mitigate those risks

Excellent writing skills with expert knowledge of grammar and punctuation

Above average skills in MS Office tool suite

Cyber Threat Hunting Analyst

What You'll Need:

Bachelor's degree in Cybersecurity, Information Technology, Computer Science or a related field; advanced degree preferred.

4+ years of experience in the cybersecurity industry, with demonstrated roles in SOC, Incident Response, Threat Intelligence, Malware Analysis, IDS/IPS Analysis, or related functions.

Proven ability to independently investigate and analyze alerts for anomalous, suspicious, or malicious activity in a corporate environment and support remediation efforts.

Experience conducting proactive threat hunts, including developing custom search criteria and identifying intrusions or potential incidents.

Strong understanding of cyber adversarial tactics, techniques, and procedures (TTPs) related to Cyber Crime, Malware, Botnets, Hacktivism, Social Engineering, APTs, and Insider Threats.

Proficient in Endpoint Detection and Response (EDR) tools and capabilities, with hands-on experience using CrowdStrike, Microsoft Defender, and other major vendors.

Foundational knowledge of Digital Forensics and Incident Response (DFIR) processes.

Experience with large dataset analysis and log analysis tools, including Securonix, Snowflake, Python, Pandas, and SQL.

Skilled in using Regular Expressions, YARA, SIGMA rules, FQL, KQL, and at least one scripting language such as Python, PowerShell, or PERL.

Strong understanding of cyber adversarial frameworks like MITRE ATT&CK and Lockheed Martin's Cyber Kill Chain.

Hands-on experience hunting for Indicators of Compromise (IOCs) in SIEM and EDR tools such as Securonix, Microsoft Defender, Microsoft Purview, Microsoft Sentinel, Palo Alto XSOAR, ThreatConnect, and Recorded Future.

Excellent written and verbal communication skills with the ability to explain technical threat hunt objectives and findings to both technical and non-technical audiences, effectively communicating associated risks.

Certifications such as Network+, Security+, CISSP, CISM, GCIH, GCFA, and/or cloud-specific certifications like AWS Cloud Practitioner, AWS Certified Security - Specialty, and Microsoft Certified: Azure Security Engineer Associate.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job
Cybersecurity Training & Awareness Analyst
Dallas, TX onsite
will work as part of the Cybersecurity organization to build, operate, and maintain a variety of programs designed to educate all levels of AA team members about key cyber threats with the goal of reducing risk across the organization.

Required Experience/knowledge

3+ years of experience with cybersecurity training and awareness; related college degree preferred

Experience with developing and operating multiple aspects of training & awareness programs e.g. training courses, formal communications, phishing campaigns, cyber ranges, etc.

Knowledge of cybersecurity domains, including policies, controls, and common regulatory requirements

Understanding of top human risks to an organization and programs designed to change behavior to mitigate those risks

Excellent writing skills with expert knowledge of grammar and punctuation

Above average skills in MS Office tool suite

Cyber Threat Hunting Analyst

What You'll Need:

Bachelor's degree in Cybersecurity, Information Technology, Computer Science or a related field; advanced degree preferred.

4+ years of experience in the cybersecurity industry, with demonstrated roles in SOC, Incident Response, Threat Intelligence, Malware Analysis, IDS/IPS Analysis, or related functions.

Proven ability to independently investigate and analyze alerts for anomalous, suspicious, or malicious activity in a corporate environment and support remediation efforts.

Experience conducting proactive threat hunts, including developing custom search criteria and identifying intrusions or potential incidents.

Strong understanding of cyber adversarial tactics, techniques, and procedures (TTPs) related to Cyber Crime, Malware, Botnets, Hacktivism, Social Engineering, APTs, and Insider Threats.

Proficient in Endpoint Detection and Response (EDR) tools and capabilities, with hands-on experience using CrowdStrike, Microsoft Defender, and other major vendors.

Foundational knowledge of Digital Forensics and Incident Response (DFIR) processes.

Experience with large dataset analysis and log analysis tools, including Securonix, Snowflake, Python, Pandas, and SQL.

Skilled in using Regular Expressions, YARA, SIGMA rules, FQL, KQL, and at least one scripting language such as Python, PowerShell, or PERL.

Strong understanding of cyber adversarial frameworks like MITRE ATT&CK and Lockheed Martin's Cyber Kill Chain.

Hands-on experience hunting for Indicators of Compromise (IOCs) in SIEM and EDR tools such as Securonix, Microsoft Defender, Microsoft Purview, Microsoft Sentinel, Palo Alto XSOAR, ThreatConnect, and Recorded Future.

Excellent written and verbal communication skills with the ability to explain technical threat hunt objectives and findings to both technical and non-technical audiences, effectively communicating associated risks.

Certifications such as Network+, Security+, CISSP, CISM, GCIH, GCFA, and/or cloud-specific certifications like AWS Cloud Practitioner, AWS Certified Security - Specialty, and Microsoft Certified: Azure Security Engineer Associate.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job