Cybersecurity professional hired to find vulnerabilities in software, hardware and networks that may be susceptible to attack, report on those vulnerabilities and often play a role in securing such weak spots.
Disclose vulnerabilities to the vendor whose hardware or software is affected, so it may patch other customers’ systems.
Musthave extensive knowledge about circumventing security protocols and cracking into computer networks. Is also adept at writing malware used to infiltrate systems.
BDA requires a Surface, Deep, and Dark Web Investigative Research professional to support the Dark Web Hunting as a Service?
Conducts daily interactions with the 24x7x365 Dark Web Threat Hunting team members regarding many commercial and government customer interactions and deliverables.
Interacts with other teams within the companyand is the point of contact for all assigned customer intelligence inquiries and queries daily.
Also may provide threat intelligence to all external Professional Services global offices and employees. Internal and external customers requiring early warning of adversarial attempts to degrade and disrupt their business operations.
Supports the customer’s physical and cyber-environment risk management programs, network security programs, insider threat programs, human resource programs, foreign travel programs, critical infrastructure and supply chain programs, etc.
Elevates the protection of internal and external customer infrastructure, business operations, employees, consumers, and the reputation of the Customer’s brand.
Facilitates the detection, identification and monitoring of terrorism, criminal, and foreign intelligence tradecraft activities targeting customer environments.
Immediate 24/7 (requires availability during nights, weekends, and holidays) response to Customer requests for research and/or analysis.
Trains on investigative and/or intelligence research and analysis techniques.
Independently and professionally consults with customers one-on-one to help guide cyber security efforts within the customer’s risk management, risk mitigation, and security programs, nights, weekends, and holidays when required.
Knowledge, experience, or certifications in conducting Open Source Intelligence (OSINT), Surface, Deep and Dark web hunting methodologies, tactics, techniques, and procedures.