Logo
McKesson’s Corporate

CT- Lead Cyber Threat Hunter

McKesson’s Corporate, Hartford, Connecticut, United States,


CT- Lead Cyber Threat Hunter

ApplyRemote Type: HybridLocations: USA, TX, Irving; USA, GA, Alpharetta; USA, TX, AustinTime Type: Full TimePosted On: Posted YesterdayJob Requisition ID: JR0119330McKesson is an impact-driven, Fortune 10 company that touches virtually every aspect of healthcare. We are known for delivering insights, products, and services that make quality care more accessible and affordable. Here, we focus on the health, happiness, and well-being of you and those we serve – we care.What you do at McKesson matters. We foster a culture where you can grow, make an impact, and are empowered to bring new ideas. Together, we thrive as we shape the future of health for patients, our communities, and our people. If you want to be part of tomorrow’s health today, we want to hear from you.Job SummaryMcKesson’s Global Cyber Threat Hunting Lead will be a member of our Cyber Investigations & Response Team executing threat hunting activities across the Enterprise. You will be responsible for leading threat actor-based investigations, implementing technical threat hunt methodologies, creating new detection methodologies, and providing expert support to incident response and monitoring functions. Your mission is to timely detect, disrupt, and eradicate threat actors from enterprise networks based on relevant and timely threat intelligence. To execute this mission, you will use data analysis, threat intelligence, and cutting-edge security technologies. You will support the security operations by applying analytic and technical skills to investigate intrusions, identify malicious activity and potential insider threats, and collaborate with the Incident Response Team on responding to detected incidents.ResponsibilitiesLead the research, analysis, and response for alerts; including log retrieval and documentation.Conduct analysis of network traffic and host activity across a wide array of technologies and platforms.Assist in incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts.Compile detailed investigation and analysis reports.Work with the Cyber Threat Intelligence (CTI) team to track threat actors and associated tactics, techniques, and procedures (TTPs) and develop countermeasures in response to those threat actors.Analyze malicious campaigns and evaluate effectiveness of security technologies.Coordinate threat hunting activities across the network leveraging intelligence from multiple internal and external sources, as well as cutting-edge security technologies.Perform Root Cause Analysis of security events and incidents for further enhancement of processes and detection/prevention strategies.Develop dashboards and reports to identify potential threats, suspicious/anomalous activity, malware, etc.Requirements10+ years of relevant cyber security experience in Threat Hunting, IT Security, Incident Response or network security with strong knowledge working in a Security Operations Center, Incident Response team, or Threat Hunting team.Experience with risk management, vulnerability management, threat analysis, security auditing, security monitoring, incident response and other information security practices preferred.Strong analytical and investigation skills & active threat hunting and adversary tracking.Excellent written and oral communication skills with the ability to effectively communicate with information technology professionals as well as senior management and auditors, assessors, and consultants.High level of personal integrity, and the ability to professionally handle confidential matters and exude the appropriate level of judgment and maturity.Working knowledge of root causes of malware infections and proactive mitigation.Working knowledge of lateral movement, footholds, and data exfiltration techniques.Ability to mentor and potentially independently lead a team of global Cyber Threat Hunters.Preferred Technical and Professional ExpertiseOne or more of the following technical security certifications or equivalent: GDAT (GIAC Defending Advanced Threats), Certified Cyber Threat Hunting Professional (CCTHP), Certified Threat Intelligence Analyst (CTIA), and GIAC Cyber Threat Intelligence (GCTI).Master’s degree in a technical field such as Computer Science, Information Security, Information Technology, Computer Engineering, or Information Systems, or equivalent degree is preferred.Knowledge of the underlying logic that security alerts are built upon and apply them when analyzing raw logs and creating new dashboards and alerts.Recognize complex problems, analyze situations, and provide suggested/implemented resolution(s).Experience and knowledge of packet flow, TCP/UDP traffic, firewall technologies, IDS technologies, proxy technologies, and antivirus, spam, and spyware solutions.Provide leadership and guidance to the team and act as a resource to the team members.Experience with one or more scripting languages (e.g., Python, JavaScript, Perl).Perform memory analysis and malware analysis.Experience with computer exploitation methodologies.We are proud to offer a competitive compensation package at McKesson as part of our Total Rewards. This is determined by several factors, including performance, experience and skills, equity, regular job market evaluations, and geographical markets. The pay range shown below is aligned with McKesson's pay philosophy, and pay will always be compliant with any applicable regulations. In addition to base pay, other compensation, such as an annual bonus or long-term incentive opportunities may be offered. For more information regarding benefits at McKesson, please click here.Our Base Pay Range for this position$139,000 - $231,600McKesson is an Equal Opportunity EmployerMcKesson provides equal employment opportunities to applicants and employees and is committed to a diverse and inclusive environment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability, age or genetic information. For additional information on McKesson’s full Equal Employment Opportunity policies, visit our Equal Employment Opportunity page.Join us at McKesson!

#J-18808-Ljbffr