Minimum 5 years of experience in SOC, Security Analyst, or Security Engineer roles., Bachelor’s degree in Information Security, Information Technology, Computer Science, or a related field., Strong knowledge of MITRE ATT&CK and industry best practices like NIST Cybersecurity Framework., Relevant certifications preferred, such as GIAC Threat Intelligence Analyst or CISSP..
Key responsabilities:
Actively monitor SIEM, IDS/IPS, and EDR tools for potential security incidents.
Conduct threat-hunting activities to identify threats that bypass existing security controls.
Analyze large datasets to identify patterns of malicious activity and recommend tool improvements.
Create detailed incident reports and advocate for proactive strategies and controls.
Report This Job
Help us maintain the quality of our job listings. If you find any issues with this job post, please let us know.
Select the reason you're reporting this job:
Since our start in 2004, WebstaurantStore.com has succeeded in creating and fostering an innovative, easy-to-use website that meets the purchasing needs of foodservice professionals throughout the world. Our warehouses located across the United States mean that we are able to serve both North American and international customers with great speed – many items located in our warehouses are ready to ship within one business day! As one of the largest food service supply companies on the Internet, WebstaurantStore.com has a team of skilled developers, programmers, content writers, technical support staff, purchasers, and warehouse employees working together to ensure we provide our customers the best in price, service, and industry knowledge. Thanks to the hard work and innovative ideas of our employees, WebstaurantStore.com has been repeatedly ranked as one of the fastest growing companies in Pennsylvania.
As the largest online distributor of restaurant supplies and equipment, WebstaurantStore, a Clark Associates company, hosts an expansive catalogue with over 430,000 products that are delivered through fast, dependable shipping, making us the internet's largest restaurant supplier. Our CAST (Clark Associates Security Team) is committed to maintaining the highest standards of security and integrity in all our applications and systems.
We are seeking an experienced senior security professional to fill our opening for a Senior Threat Hunter & Incident Responder. In this role, you will assist with building out our threat hunting program as we seek to proactively identify cyber threats that may evade our traditional automated detection methods. Additionally, you will assist in maturing the organization’s incident response capabilities through playbook creation & refinement. As necessary, this role will also facilitate incident response efforts from detection through recovery. Individuals interested in playing an active role in shaping the organization’s threat detection & response activities are encouraged to apply.
Responsibilities
Real-Time Monitoring: Actively monitor SIEM, IDS/IPS, and EDR tools to detect potential security incidents.
Proactive Threat Identification: Conduct threat-hunting activities to identify threats that may have bypassed existing security controls, using a combination of manual analysis and automated tools.
Data Analysis: Analyze large datasets from SIEM, EDR, network traffic, and other sources to identify patterns indicative of malicious activity or make recommendations for tool improvement.
Threat Intelligence Integration: Leverage threat intelligence feeds to inform hunting activities and stay up-to-date on the latest adversarial tactics, techniques, and procedures (TTPs).
Incident Analysis: Analyze malicious code, network traffic, and system logs to identify the root cause of incidents, potential vulnerabilities, and Indicators of Compromise (IoCs).
Documentation: Create detailed incident reports, including root cause analysis, mitigation actions, and lessons learned, ensuring thorough documentation for future reference.
Continuous Improvement: Stay informed about emerging threats, frameworks, and best practices to advocate for proactive strategies and controls. Regularly evaluate the organization’s threat landscape & incident response protocols to recommend improvements or additions to defense preparations.
Physical Requirements
Work is performed while sitting/standing and interfacing with a personal computer.
Requires the ability to communicate effectively using speech, vision, and hearing.
Requires the regular use of hands for simple grasping and fine manipulations.
Requires occasional bending, squatting, crawling, climbing, and reaching.
Requires the ability to occasionally lift, carry, push, or pull medium weights, up to 50lbs.
Remote Work Qualifications
Access to a reliable and secure high-speed internet connection. Cable or fiber internet connections (at least 75mbps download/10mbps upload) are preferred, as satellite connections often cannot support the technologies used to perform day-to-day tasks.
Access to a home router and modem.
A dedicated home office space that is noise- and distraction-free. The space should have strong wireless connection or a wired Ethernet connection (wired connection is preferred, if possible).
A valid, physical address (apartment, suite, etc.). PO Boxes are not supported, as a physical address is required for you to receive your computer equipment.
The desire and ability to work and communicate with other team members via chat, webcam, etc.
Legal residents of one of the following states: (AK, AL, AR, AZ, CT, DE, FL, GA, IA, ID, IN, KS, KY, LA, MD, ME, MI, MN, MO, MS, NC, ND, NH, NM, NV, OH, OK, PA, SC, SD, TN, TX, UT, VA, VT, WI, WV, or WY). H-1B Visa Sponsorship Not Available, W2 only.
Experience
Minimum 5 years of experience in SOC, Security Analyst, or Security Engineer roles.
Strong knowledge of MITRE ATT&CK, threat intelligence feeds, and industry best practices (e.g., NIST Cybersecurity Framework, ISO/IEC 27001).
Hands-on experience operating SIEM, EDR, and IDS/IPS solutions.
Excellent communication, organizational, and time management skills.
Relevant certifications preferred: GIAC Threat Intelligence Analyst (GTHA), GIAC Certified Incident Analyst (GCIA), Certified Information Systems Security Professional (CISSP), or related incident response & threat hunting credentials
Education
Bachelor’s degree in Information Security, Information Technology, Computer Science, or a related field (or equivalent experience).
Desired Traits
Effective Communication: Adept in presenting threat & incident status to executive leadership, translating technical threats into business risks and implications.
Technical Expertise: Expert in conducting root cause analysis, identifying systemic vulnerabilities, and implementing preventative measures.
Industry Knowledge: Deep understanding of cybersecurity frameworks, threat landscapes, and can adapt response tactics based on evolving threats.
Time and Priority Management: Ability to effectively lead multiple complex threat hunting operations & high-priority incidents responses simultaneously.
Leadership: Takes on a strategic role in developing the organization's threat-hunting and incident response programs.
Company Overview
The foodservice professional’s premier source for restaurant equipment, supplies, and knowledge online. Our purpose is to empower and equip people to run their businesses more profitably and efficiently.
Benefits
Medical
Vision
Dental
PTO
Paid Maternity Leave
Paid Parental Leave
Life Insurance
Disability
Dependent Care FSA
401(k) matching
Employee Assistance Program
Wellness Incentives
Company Discounts
AT&T & Verizon Discount
Bonus Opportunities
Available at HQ Locations Only
On-Site Fitness Centers
Dog-friendly Offices
Required profile
Experience
Industry :
Wholesale
Spoken language(s):
English
Check out the description to know which languages are mandatory.