Call for Incident Response

866.428.4567

We Are Hiring

We’re looking for qualified candidates to be a part of our team. View the listing below for role, job description, desired background / skillset and additional information.

Role:

Threat Content Engineer

Department:

Security Operations

Location:

Scottsdale, AZ (SOC)

Manager:
Dave Norlin
Job Description:

The Threat Analyst position will be responsible for reviewing & understanding the customer security profile, critical assets and what security tools/devices are on their network. Using this information, the Threat Analyst will do active hunting for anomalies, vulnerabilities & potential/existing threats in the customer environment. This position will need to learn what the customer has, potential issues and work with the SOC to alert and with the threat content team to expand ShieldVision alerts, content and/or reports. This position will be involved in all SEV/TIER 1 activities. Secondarily this role will assist the threat content team in training and mentorship of SOC analysts.

What You Will Be Doing:

This position should find alerts or notification worthy items utilizing customer logs, packets, endpoints, intel & Customer Profiles/Asset Criticality and forward to the SOC staff for case creation and notification. The SOC will focus on threat hunting, IE the phishing campaigns and various other threats they search for while this position will be much more strategic.

Desired Background / Skillset:
  • Understand how threat attacks to clients’ systems can be applied, detected, and defended against through continuous learning and skills development
  • Continuously research and analyze the customers systems to ensure they maintain security in the face of new threats to, and changes in, the clients’ environments
  • Replicate sophisticated cyber-attacks to continuously test and improve the capability of the SOC teams
  • Work with SOC, Engineering, Threat Intel & Customers to ensure we are seeing the important and critical systems/data
  • Identify advanced malicious activity that has evaded traditional security monitoring capability
  • Support the SOC on high profile incidents to ensure the timely completion of all cyber investigations
  • Engagement with other SOC teams & senior management when confronted with potential security issues
  • Mentor and train junior SOC analysts in their responsibilities, processes, and skill sets
  • Provide feedback to runbook processes and procedure documentation
  • Conduct advanced research and mapping for internal networks directed toward baselining normal operation parameters
  • Identify gaps in log collection, signatures, and indicators of compromise (IOC) visibility. Then work with customer success team and engineering to improve detection capabilities
  • Provide training and education for SOC & Engineering team members
  • Write reports for technical and non-technical internal teams regarding hunting discoveries and suggested solutions in a way to help make a response more affective
Desired Education Level:

Bachelor's Degree or Equivalent Experience

We are an Equal Opportunity Employer

DATASHIELD is an equal opportunity employer committed to diversity in the workplace.

APPLY

Why Work For DATASHIELD?

Growth

DATASHIELD is growing. We want you to grow with us. New openings can fast track your career.

Great Location

There’s a reason they call it the Valley of the Sun. Ditch the puffy coat. You won’t need it.

Compensation

With DATASHIELD's competitive salaries and benefit packages, you’ll be paid what you’re worth.