Threat Hunter

  • Full-time
  • Contract type: Standard

Company Description

About Veolia North America

A subsidiary of Veolia Group, Veolia North America (VNA) offers a full spectrum of water, waste and energy management services, including water, and wastewater treatment, commercial and hazardous waste collection and disposal, energy consulting and resource recovery. VNA helps commercial, industrial, healthcare, higher education, and municipality customers throughout North America. Headquartered in Boston, Mass., Veolia North America has approximately 10,000 employees working at more than 350 locations across the continent. Please visit our website www.veolianorthamerica.com.

Job Description

BENEFITS

Veolia's comprehensive benefits package includes paid time off policies, as well as health, dental and vision insurance. In addition, employees are also entitled to participate in an employer sponsored 401(k) plan, to save for retirement.  Pay and benefits for employees represented by a union are outlined in their collective bargaining agreement. 

Position Purpose: 

The Threat Hunter is responsible for analyzing and correlating large data sets to uncover novel threats and attack techniques that may be present within the environment. This role is responsible to develop and document new and innovative threat hunt hypotheses to increase the team’s ability to find existing threats that are otherwise going unidentified or unnoticed.

Primary Duties/Responsibilities:

  • Work with technical teams within Global Group Security to gain insight into critical security controls and architectural specifics to develop valuable hunt strategies and analytics that identify malicious behavior accurately while maintaining a low false positive rate.
  • Advise on and review product assessments, policy adjustments, and architectural transformations that impact the corporation, and will be a thought leader in the design of cutting-edge detective, preventative, and proactive controls.
  • Lead the analysis, implementation, execution and improvement of proactive security controls to prevent external threat actors from infiltrating company information or systems.
  • Conduct research and provide leadership updates regarding advanced attempts/efforts to compromise security protocols.
  • Maintain or review security systems and assess security policies that control access to systems.
  • Provide status updates and recommendations to the leadership team regarding the impact of theft, destruction, alteration or denial of access to information.
  • Follow standard practices and procedures in analyzing situations or data.
  • Actively share knowledge and mentor members of the team.

Work Environment:

  • This will be a hybrid role located in Milwaukee, WI.

Qualifications

Education/Experience/Background:

  • Bachelor’s or Master’s Degree in Computer Science, Engineering, Information Security or extensive professional experience considered in place of a Bachelor's degree.
  • 8+ years of experience in a technical role in the areas of Security Operation, Incident Response, Detection Engineering, Offensive Security/Red Team, or Cyber Threat Intelligence.
  • Direct experience performing threat hunting in an active corporate environment.
  • Experience analyzing system, network, and application logging for attack techniques at all stages of the cyber kill chain.
  • Direct experience working with very large datasets and log analysis tools.
  • Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways.
  • Experience explaining threat hunt objectives in plain English and able to communicate associated risk.
  • Experience with more than one or more enterprise scale EDR and SIEM tools.
  • Previous experience performing digital forensics or indecent response on major security incidents.

Knowledge/Skills/Abilities:

  • Demonstrating a broad perspective to reconcile conflicting requirements from various departments, fostering collaboration, and delivering effective solutions that drive results.
  • Ability to navigate and work effectively across a complex, geographically dispersed organization.
  • Demonstrated ability to self-direct, with minimal supervision to achieve assigned goals.
  • Knowledge of basic Data Science concepts and processes.
  • Experience with offensive security tools such as Cobalt Strike/Metasploit, techniques such as OSINT, and the methods used to compromise large enterprise networks.
  • Ability to apply Cyber Threat Intelligence through enrichment, correlation, and attribution.
  • Familiarity with offensive security strategies and assessment methodology.

Additional Information

We are an Equal Opportunity Employer! All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.

Disclaimer: The salary, other compensation, and benefits information is accurate as of the date of this posting. The Company reserves the right to modify this information at any time, subject to applicable law.

Privacy Policy