Comcast
Security Engineer 3 (Threat Hunter)
This job is now closed
Job Description
- Req#: R353878
Comcast brings together the best in media and technology. We drive innovation to create the world's best entertainment and online experiences. As a Fortune 50 leader, we set the pace in a variety of innovative and fascinating businesses and create career opportunities across a wide range of locations and disciplines. We are at the forefront of change and move at an amazing pace, thanks to our remarkable people, who bring cutting-edge products and services to life for millions of customers every day. If you share in our passion for teamwork, our vision to revolutionize industries and our goal to lead the future in media and technology, we want you to fast-forward your career at Comcast. Job Summary Seeking a motivated and energetic individual, with a proven track record for Cyber Security & Threat Detection. Someone that demonstrates the abilities to proactively and iteratively detect, isolate, and neutralize advanced threats that evade automated security solutions. The position with the Security Intelligence & Threat Hunting (SITH) team will be centered on conducting in-depth cyber threat analysis, focusing on a threat intelligence-driven & hypothesis-guided hunting methodology for proactive detection of advanced threats that evade traditional automated security solutions. Individuals on the team analyze security data collected from across the Enterprise environment to identify anomalous behaviors based on both known and unknown adversary Tactics, Techniques and Procedures (TTPs). Individuals will also analyze current and past investigations to improve the overall Enterprise security posture, by identifying potential gaps in visibility and detection and working with stakeholders to automate solutions. Job Description Core Responsibilities: • Threat Discovery / Threat Hunting o Responsible for regularly scheduled and repeatable Purple Teams to ensure detections are working. o Develop intelligence-driven hypotheses for hunts to target specific potential threat actors and vectors o Proactively "hunt" for potential malicious activity and incidents across multiple customers using advanced network- and host-based tools o Perform in-depth investigation & data analytics of events identified during threat hunt activities or security alerts received from various security technologies o Exploration and integration of new cybersecurity tools, processes, and capabilities o Contribute to the tuning and development of security information and event monitoring systems (SIEM) use cases and other security control configurations to enhance threat detection capabilities o Provide support in the detection, response, mitigation, and reporting of cyber threats affecting client networks with the ability to evaluate IT environments and identify security goals, objectives and requirements • Analysis & Reporting o Creation of concise and professional materials to communicate goals, objectives and incident reporting. o Develop dashboards & reporting for continuous monitoring of targeted activity and for communication of quantifiable metrics to leadership o Continuously review and evaluate the state of Comcast Security environment and recommend technology and process improvements. o Serve as a technical leadership team and advisor to key stakeholders, establishing trust-based relationships through active engagement and collaboration. Qualifications: Required Experience: • Must have hands-on experience in at least some of the following areas: forensic science, data analysis, intelligence analysis, malware reversing, network and endpoint security, adversary tracking, and other security-related tasks. • 5 - 8 years of professional experience, with 4+ years of experience in information security and/or IT risk management • Knowledge of architecting solutions with a concentrated focus on security, performance, scalability, and reliability. • Must understand the current Cyber Security Landscape, such as, a deep knowledge of current and past malware methods, attack methodologies, and TTPs (Tactics, Techniques, Procedures) • Knowledge of Operating Systems and Network Protocols - An extensive knowledge of the inner workings of operating systems (Windows and Linux/Unix) is also indispensable. Moreover, cyber threat hunters also need to have a strong understanding of how different network protocols, such as the TCP/IP stack, work. • Technical Writing and Reporting Skills - Preparing security reports and different technical documents is an essential part of cyber threat hunting, so hunters also need to have excellent technical writing and reporting skills. • Experience in working and presenting to Executives in both IT and Business. • Highly advanced written and communication skills. • Knowledge of current hacking techniques, vulnerability disclosures, data breach incidents, and security analysis techniques • Familiarity with data analytics platforms (e.g. Various flavors of SQL, Splunk, Tableau) & analytic methodologies • Knowledge of threats and various attacker methods including tools/techniques/practices • Familiarity with existing TTP frameworks (MITRE ATT&CK, Cyber Kill Chain) • Demonstrated technical experience with Networking (e.g. data flows, architecture, protocols, traffic analysis, wireless, etc) • Demonstrated technical experience with detailed host-level logging (e.g. Windows Security logs, auditd, process logging) • Coding Skills - Hunters need to be fluent in at least one scripting language (Python preferred.). However, it can also be useful to know one or more compiled languages (C, C++, etc.) as well. They also need to know how to parse logs, automate tasks, and perform complex data analysis. • Familiarity with scripting languages & concepts (e.g. Python, Powershell, bash, regular expressions) • Familiarity with performing Ethical Hacking of both web applications and their associated platforms (e.g. J2EE, .Net, Apache, IIS, Websphere) and infrastructure elements (e.g. Windows/Linux operating systems, Oracle/SQL servers, firewalls, routers, switches) • Familiar with common commercial and/or open source vulnerability assessment tools and techniques used for evaluating operating systems, networking devices, databases and web servers • Experience working with security monitoring, security intelligence, data analytics, security incident response, penetration testing, SIEM, and analytics tools. • Soft Skills - Threat hunters need to possess a handful of soft skills such as strong stress management, analytical, research, and problem-solving skills. They need to be self-starters who are able to work with minimal management, however also need to have strong collaboration and interpersonal skills as they usually work together with several other professionals from other information security fields. Nice to Haves • Knowledge of Comcast Technology, organizations, people, processes, culture, and systems. • Proven Success engaging stakeholders in continuous change and workflow improvement. • Ability to understand and support business operational functions. Compliance Disclaimer: Comcast is an EEO/AA/Drug Free Workplace. Comcast NBCUniversal is an equal opportunity, Veterans, Disabled and LGBT employe Comcast is proud to be an equal opportunity workplace. We will consider all qualified applicants for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, disability, veteran status, or any other basis protected by applicable law. Education Bachelor's Degree While possessing the stated degree is preferred, Comcast also may consider applicants who hold some combination of coursework and experience, or who have extensive related professional experience. Relevant Work Experience 7-10 Years Base pay is one part of the Total Rewards that Comcast provides to compensate and recognize employees for their work. Most sales positions are eligible for a Commission under the terms of an applicable plan, while most non-sales positions are eligible for a Bonus. Additionally, Comcast provides best-in-class Benefits. We believe that benefits should connect you to the support you need when it matters most, and should help you care for those who matter most. That’s why we provide an array of options, expert guidance and always-on tools, that are personalized to meet the needs of your reality – to help support you physically, financially and emotionally through the big milestones and in your everyday life. Please visit the compensation and benefits summary on our careers site for more details.About the company
Comcast Corporation is a global media and technology company with two primary businesses: Comcast Cable and NBCUniversal. Comcast Cable is one of the United States' largest video, high-speed Internet, and phone providers to residential customers under the XFINITY brand, and also provides these services to businesses.
Notice
Talentify is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or protected veteran status.
Talentify provides reasonable accommodations to qualified applicants with disabilities, including disabled veterans. Request assistance at accessibility@talentify.io or 407-000-0000.
Federal law requires every new hire to complete Form I-9 and present proof of identity and U.S. work eligibility.
An Automated Employment Decision Tool (AEDT) will score your job-related skills and responses. Bias-audit & data-use details: www.talentify.io/bias-audit-report. NYC applicants may request an alternative process or accommodation at aedt@talentify.io or 407-000-0000.