Upvote
Downvote
Threat Hunter Host Based Systems Analyst - IV
Share Job
- Suggest Revision
- Contract personnel provide front line response for digital forensics/incident response and proactively hunting for malicious cyber activity for this critical customer mission.
- Must have an active Secret clearance (TS/SCI eligible) and be able to obtain DHS Suitability
- Vulnerability scanning, assessment and monitoring tools such as Security Center, Nessus, and Endgame
- MITRE Adversary Tactics, Techniques and Common Knowledge (ATT&CK)
- EnCase, FTK, SIFT, X-Ways, Volatility, WireShark, Sleuth Kit/Autopsy, and Snort
Active Job
Updated 5 days agoSimilar Job
Relevance
Active