Senior Threat Hunter
Listed on 2025-12-01
-
IT/Tech
Cybersecurity
At Allstate, great things happen when our people work together to protect families and their belongings from life’s uncertainties. And for more than 90 years our innovative drive has kept us a step ahead of our customers’ evolving needs. From advocating for seat belts, air bags and graduated driving laws, to being an industry leader in pricing sophistication, telematics, and, more recently, device and identity protection.
Job Description
We are seeking an experienced Senior Threat Hunter to perform, intelligence-driven network defense supporting the monitoring and incident response capabilities and advise governance, technical, and business leadership on results, vulnerabilities, and solutions to mitigate. The role will involve analysis of large amounts of data from vendors and internal sources, including various indicator feeds, SIEM, and several threat intelligence tools, etc.
This individual will perform the functions of threat operations and hunting and serve as a liaison for Threat Services for the Global Security Fusion Center (GSFC), and mentor the incident handling, incident response, and forensics teams.
Key Responsibilities- Design and run custom analysis models on security event information to discover active threats.
- Identify (hunting) security nuances and abnormalities in the environment.
- Develop use cases and actionable content to identify security issues that are currently not alerted within the environment.
- Lead projects and assignments.
- Provide custom tool design to assist in analysis and investigations.
- Perform as an Information Security resource in three or more of the following areas:
- Threat Intelligence
- Incident Response
- Log analysis (statistical modeling, correlation, pattern recognition, etc.)
- Microsoft platform (Server, workstation, applications)
- Open Systems platforms (Linux, UNIX, VMWare ESX, Nutanix)
- Web Application
- Networking (firewalls, IDS/IPS, packet capture)
- Databases (Oracle, SQL Server, DB2, IMS)
- SIEM
- Reverse Engineering / Malware analysis
- Collaborate and support teammates and outside teams with regard to threat hunting techniques/issues.
- Communication/build rapport with other divisions and various peers.
- Identify needs, drivesolutions, and provide guidance in an autonomous manner.
- 5+ years overall technical experience in threat hunting, threat intelligence, incident response, security operations, or related information security field.
- 2+ years’ experience in penetration testing, ethical hacking, exploit writing, and/or vulnerability management.
- Bachelor's and/or Master’s Degree in IT Security, Engineering, Computers Science, or related field/experience.
- Deep understanding of common network and application stack protocols, including but not limited to TCP/IP, SMTP, DNS, TLS, XML, HTTP, etc.
- Advanced experience with security operations tools, including but not limited to:
- SIEM (e.g., Splunk, Arc Sight)
- Network analysis (e.g., Net Witness, Palo Alto)
- Signature development/management (e.g., Spunk rules, Snort rules, Yara rules)
- EDR solutions (e.g., Crowd Strike, Tanium, Defender)
- Broad experience with various common security infrastructure tools (NIDS, HIPS, EDR, etc.).
- Scripting experience related to system administration and security operations (Python, Bash, Power Shell, Perl, C/C++).
- Excellent analytical and problem-solving skills, a passion for research and puzzle-solving.
- Strong communication (oral, written, presentation), interpersona land consultative skills.
- Leadership and mentorship skills.
- Experience hunting in AWS and/or Azure environments.
- Deep understanding of large, complex corporate network environments.
- Strong knowledge or experience in penetration testing, ethical hacking, exploit writing, and/or vulnerability management.
- Knowledge or experience in application design/engineering, including but not limited to programming/scripting, Windows/Linux system administration, RDBMS/No
SQL database administration, etc. - Recent experience with malware analysis and reverse engineering.
- Obtained certifications in several of the following: SANS GIAC courses, CEH, CISSP, OSCP, or tool-specific certifications.
#LI-JJ1
Skills
Cyber Incident Response,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).