This position will provide cyber discovery and counter-infiltration (hunt) services that detect, illuminate, and respond to threats on computer networks or Information Technology (IT) systems. Hunt analysts determine the appropriate network and host-based sensor strategy and monitoring, establish baselines and assess changes to baselines, define indicators of compromise, determine technical intelligence requests for information, apply computer forensic methodologies to explain system or traffic anomalies, recommend incident response actions, and analyze malware and compromised systems.
Possess at least two of the following certifications (or equivalent.) Certifications must be current. If cert is not listed we will make individual determination or seek customer approval:
EIS is an Equal Opportunity Employer/M/F/V/Disabled.