Associate Information Security Threat Hunter
Quicken Loans
- Detroit, MI
- Permanent
- Full-time
- RKT Holdings is a centralized hub that delivers thoughtful and innovative solutions for Rocket Companies®. We are the center of operations, technology, marketing, HR, legal, strategy and more that propels our companies forward. Here, we’ll give you the opportunity to launch your career and work with various companies, spanning multiple industries from fintech, to auto and real estate. We offer you the tools you’ll need to succeed, no matter what stage you’re at in your career. You’ll be able to master your craft here by working on complex problems in a collaborative culture and challenging yourself to make a real impact.
- Bachelor's degree or equivalent competency in computer science, information technology or a related field
- 2 years of experience in a technical role within security operations, threat intelligence, incident response, red team or related
- Foundational knowledge of operating system internals and security configurations, including Windows, Mac, Linux/Unix
- Experience working with large data sets, using Security Information and Event Management (SIEM) tools
- Familiarity with attacker tactics and techniques
- Foundational knowledge of network theory or design
- Foundational knowledge of enterprise risk methodologies
- Experience in the mortgage financial industry or financial technology (FinTech) industry
- Experience analyzing attacker tactics and techniques at all stages of a breach
- Experience using scripting languages to extract data from large datasets
- Proficiency gathering and presenting data from multiple sources to identify and recommend threat detection enhancements
- Advanced technical degrees or cyber security certifications such as Certified Information Systems Security Professional
- (CISSP), Offensive Security Certified Professional (OSCP) or related
- Use threat intelligence and models to create hypotheses
- Plan, scope and document threat hunts to verify threat hypotheses
- Explore and correlate large data sets to uncover novel attack techniques, monitor and document changes in activity, and generate custom alerts, and/or new controls based on findings
- Utilize hunting tools and automation for use in the discovery and continual monitoring of sophisticated adversarial behavior
- Build and maintain relationships with client and technical stakeholders to meet objective