Blackpoint Cyber is the leading provider of world-class cybersecurity threat hunting, detection and remediation technology. Founded by former National Security Agency (NSA) cyber operations experts who applied their learnings to bring national security-grade technology solutions to commercial customers around the world, Blackpoint Cyber is in hyper-growth mode, fueled by a recent $190m series C round.
Company Culture
On this team, we value high-quality execution, ownership, and strong morals. With us, principles are never tested, and we are proud to always do right by our customers. If you’re a driven professional with a passion for learning and contributing towards the best, then Blackpoint welcomes you. Our team is energetic and collaborative, maintaining a high-performance culture and enabling growth through overcoming challenges in the modern cyberthreat landscape.
Night Shift Requirement
This shift is Monday through Friday from 12:00 AM EST - 8:00 AM EST. Please only apply if you can work this shift.
How You'll Make an Impact:
Analyze and evaluate anomalous network and system events in a 24x7x365 Security Operation Center (SOC) environment via conducting lead-less threat hunting.
Collaborate with MDR Analysts to research and investigate emerging cyber security threats; become an escalation point of contact for advanced intrusion analysis.
Develop Incident analysis reports and work across business units and customers to bring issues to a close.
Help design and build operational processes and procedures to improve overall SOC efficiency.
Provide actionable threat and vulnerability analysis based on security events for many independent customer environments.
Build test lab environments to research emerging techniques and make contributions to the internal and external knowledge development of threat operations.
Review sandbox technologies for additional IOCs uncovered from artifacts uncovered during analysis.
What you'll Bring:
Five (5+) years of experience in an information security role. Progressive relevant training and/or certification may be substituted for one (1) year of the experience requirement
Experience working in a Security Operations Center (SOC)
Two (2+) years of experience with triaging endpoint events from EDR, NGAV, and supporting the Incident Response (IR) process
Deep knowledge on assessing threat indicators in a Windows Environment (e.g. Malware/Malicious Anomalies/Abnormal network Activity/Root Level Compromise, Forensic Artifacts, etc.)
Robust understanding of at least two of the following: Windows, Linux or OSX;
Familiarity with ELK stack (Dashboards, Logstash Config, Searching) Scripting / Programming with Powershell, Python, and Go
Familiarity with AWS services such as EC2, S3 and IAM and Azure/M365
Experience in developing, refining, and performing leadless threat hunting analysis to uncover new or potential incidents and report on results
Excellent problem solving, critical thinking, and analytical skills with the ability to deconstruct issues (hunting anomalous pattern detection)
Excellent written and verbal communication skills to effectively summarize and present technical findings to both technical and non-technical audiences
Bonus:
Bachelor’s Degree in Computer Science or related technical discipline
Network/System Administration and/or Engineering
Deep forensic knowledge of Windows, Mac OS and/or Linux
Experience in Digital Forensics and Incident Response a plus
Malware Analysis (Behavioral and/or Static analysis- IDA, Cuckoo Sandbox, x86/x64 Debugging) Pentesting/Red/Blue Team
Capture The Flag (CTF) Development
Blackpoint Cyber welcomes and encourages applications from qualified individuals of all races, colors, religions, sex, sexual orientation, gender identity or expression, national origin, age, marital status, or any other legally protected status. We are committed to equality of opportunity in all aspects of employment. For eligible employees in the US, Blackpoint offers competitive Health, Vision, Dental, and Life Insurance plans, a robust 401k plan, Discretionary Time Off, and other minor perks.
$100K – $130K
The above sets forth the annual base salary range in USD for this role exclusive of any discretionary bonus that may be awarded. Actual compensation will be based on an assessment of factors including the successful candidate’s location, experience, skill, and other job-related factors.
The Reliability Manager will serve as the Site System Leader at our fully integrated paper mill, which employs more than 600 staff members. This role is pivotal in enhancing asset utilization, operational uptime, and overall production by deploying well-established improvement...
...manage calendars, schedule meetings - onsite and offsite - ensuring that meetings run smoothly from a logistics perspective Handle travel arrangements, hotels, flights, cars, both international and domestic Compile and submit monthly expense reports Assist with...
Role & Responsibilities: Help achieve high levels of profitable growth on all assigned shipments by proactively analyzing order for overages and shortages, assisting in cycle and inventory counts, inspecting delivers for damage making note of any damages and advising...
...highest level of service including project management and budget control services. CTS is seeking is seeking multiple CWI Inspectors with NDT Level II MT and Level II UT to perform inspections for the shop/field. To include the following: audits, inspecting structural steel...
...and AI initiatives. You will be responsible for developing scalable solutions that connect our existing software ecosystem while implementing new AI-powered... ...absence, compensation, benefits, training, and apprenticeship. Our firm makes hiring decisions based solely on...