Galvanick
Threat Hunter / Security Analyst
Galvanick, Seattle, Washington, us, 98127
Galvanick protects the industrial world against cyber attacks. Our threat detection platform
for factories and critical infrastructure defends the modern world against criminals and nation-states that target SCADA (Supervisory Control and Data Acquisition) and ICS (Industrial Control Systems). This is a chance to work in a startup environment with driven individuals committed to solving cybersecurity's big problems. The team comes from Amazon, Google, the White House, the US Navy, and Wall Street. We are backed by Founders Fund, Village Global, MaC Venture Capital, and others.About the RoleWe are seeking a highly skilled individual to join our team as a Threat Hunter / SOC Analyst. In this role, you will play a critical role in enhancing our operational security by conducting manual threat detection operations and proactively hunting for potential threats. You will ensure the threat hunting tools and methodologies employed by the company will scale with Galvanick’s growth and success. This is a great opportunity to leverage the data collected by Galvanick to proactively hunt and identify security threats within customer systems and networks. You will provide insights through monthly reports with overview of findings and high level recommendations.What You Will Do* 5+ years of experience with one or more of the following areas, Incident Response, Security Operations, Threat Hunting, and Cyber Threat Intelligence.* Experience monitoring and analyzing telemetry data from application, infrastructure, and endpoint.* In-depth knowledge of security tools, techniques, and methodologies. Familiarity with threat intelligence platforms and frameworks.* Strong analytical and problem-solving skills, with the ability to think strategically and identify potential threats.* Excellent understanding of attack vectors, vulnerabilities, and common security weaknesses.* Proven experience as a SOC analyst or threat hunter, with a strong operational security background.* Effective communication skills, with the ability to clearly convey complex security concepts to both technical and non-technical stakeholders. Experience writing monthly reports with overview of findings and high level recommendations.Who You Are* 5+ years of experience with one or more of the following areas, Incident Response, Security Operations, Threat Hunting, and Cyber Threat Intelligence.* Experience monitoring and analyzing telemetry data from application, infrastructure, and endpoint.* In-depth knowledge of security tools, techniques, and methodologies. Familiarity with threat intelligence platforms and frameworks.* Strong analytical and problem-solving skills, with the ability to think strategically and identify potential threats.* Excellent understanding of attack vectors, vulnerabilities, and common security weaknesses.* Proven experience as a SOC analyst or threat hunter, with a strong operational security background.* Effective communication skills, with the ability to clearly convey complex security concepts to both technical and non-technical stakeholders. Experience writing monthly reports with overview of findings and high level recommendations.Bonus Points* Experience conducting threat hunting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists.* Knowledge of cyber threat intelligence terminology and data communication concepts and technologies.* You enjoy solving problems and are naturally curious about the technologies and tools you use.* Startup experience and an understanding of zero to one ideas. You enjoy attacking complex and novel problems.* Experience with industrial, operational, or fulfillment environments.* Relevant certifications such as CISSP, CEH, or GCIH are desirable.We provide top-of-the-line medical/dental/vision for employees and dependents, and have additional benefits designed to optimize every team member’s vitality, health, and wellness.LocationThe Galvanick team is based in Seattle. Given that we are an early-stage startup working on an exceptionally hard problem, we expect new team members to be in office. We are happy to cover relocation expenses.To conform to US Government export regulations, including the International Traffic in Arms Regulations (ITAR) you must be a US citizen, lawful permanent resident of the US, protected individual as defined by 8 U.S.C. 1324b(a)(3), or eligible to obtain the required authorizations from the US Department of State. Learn more about the ITAR here
.
#J-18808-Ljbffr
for factories and critical infrastructure defends the modern world against criminals and nation-states that target SCADA (Supervisory Control and Data Acquisition) and ICS (Industrial Control Systems). This is a chance to work in a startup environment with driven individuals committed to solving cybersecurity's big problems. The team comes from Amazon, Google, the White House, the US Navy, and Wall Street. We are backed by Founders Fund, Village Global, MaC Venture Capital, and others.About the RoleWe are seeking a highly skilled individual to join our team as a Threat Hunter / SOC Analyst. In this role, you will play a critical role in enhancing our operational security by conducting manual threat detection operations and proactively hunting for potential threats. You will ensure the threat hunting tools and methodologies employed by the company will scale with Galvanick’s growth and success. This is a great opportunity to leverage the data collected by Galvanick to proactively hunt and identify security threats within customer systems and networks. You will provide insights through monthly reports with overview of findings and high level recommendations.What You Will Do* 5+ years of experience with one or more of the following areas, Incident Response, Security Operations, Threat Hunting, and Cyber Threat Intelligence.* Experience monitoring and analyzing telemetry data from application, infrastructure, and endpoint.* In-depth knowledge of security tools, techniques, and methodologies. Familiarity with threat intelligence platforms and frameworks.* Strong analytical and problem-solving skills, with the ability to think strategically and identify potential threats.* Excellent understanding of attack vectors, vulnerabilities, and common security weaknesses.* Proven experience as a SOC analyst or threat hunter, with a strong operational security background.* Effective communication skills, with the ability to clearly convey complex security concepts to both technical and non-technical stakeholders. Experience writing monthly reports with overview of findings and high level recommendations.Who You Are* 5+ years of experience with one or more of the following areas, Incident Response, Security Operations, Threat Hunting, and Cyber Threat Intelligence.* Experience monitoring and analyzing telemetry data from application, infrastructure, and endpoint.* In-depth knowledge of security tools, techniques, and methodologies. Familiarity with threat intelligence platforms and frameworks.* Strong analytical and problem-solving skills, with the ability to think strategically and identify potential threats.* Excellent understanding of attack vectors, vulnerabilities, and common security weaknesses.* Proven experience as a SOC analyst or threat hunter, with a strong operational security background.* Effective communication skills, with the ability to clearly convey complex security concepts to both technical and non-technical stakeholders. Experience writing monthly reports with overview of findings and high level recommendations.Bonus Points* Experience conducting threat hunting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists.* Knowledge of cyber threat intelligence terminology and data communication concepts and technologies.* You enjoy solving problems and are naturally curious about the technologies and tools you use.* Startup experience and an understanding of zero to one ideas. You enjoy attacking complex and novel problems.* Experience with industrial, operational, or fulfillment environments.* Relevant certifications such as CISSP, CEH, or GCIH are desirable.We provide top-of-the-line medical/dental/vision for employees and dependents, and have additional benefits designed to optimize every team member’s vitality, health, and wellness.LocationThe Galvanick team is based in Seattle. Given that we are an early-stage startup working on an exceptionally hard problem, we expect new team members to be in office. We are happy to cover relocation expenses.To conform to US Government export regulations, including the International Traffic in Arms Regulations (ITAR) you must be a US citizen, lawful permanent resident of the US, protected individual as defined by 8 U.S.C. 1324b(a)(3), or eligible to obtain the required authorizations from the US Department of State. Learn more about the ITAR here
.
#J-18808-Ljbffr