About the job
Join Blackpoint Cyber, a forefront leader in cybersecurity specializing in threat hunting, detection, and remediation technologies. Established by former NSA cyber operations experts, we leverage national security-grade solutions to protect commercial clients globally. Our rapid growth is propelled by a substantial $190 million Series C funding round.
Company Culture
At Blackpoint, we emphasize excellence, accountability, and integrity. Our team is dedicated to doing right by our clients, and we invite passionate professionals who aspire to learn and excel to join our energetic and collaborative environment. We foster a high-performance culture that thrives on tackling contemporary cyber threats.
Your Impact:
Conduct thorough analysis and evaluation of unusual network and system events in a 24x7 Security Operations Center (SOC) environment through proactive threat hunting.
Work alongside MDR Analysts to research and investigate new cybersecurity threats, acting as a primary escalation point for advanced intrusion analysis.
Create detailed incident analysis reports and collaborate with various business units and clients to resolve issues efficiently.
Design and implement automation solutions to enhance SOC operational efficiency.
Deliver actionable threat and vulnerability assessments based on security events across diverse customer environments.
Build testing lab environments to explore emerging techniques and contribute to the knowledge development of threat operations.
Review sandbox technologies for additional indicators of compromise (IOCs) discovered during analysis.
Qualifications:
Minimum of five (5) years’ experience in an information security role. Relevant training and/or certifications can substitute for one (1) year of experience.
Prior experience in a Security Operations Center (SOC), Threat Hunting, or Digital Forensics and Incident Response (DFIR) is preferred.
Two (2) years of experience in triaging endpoint events from EDR, NGAV, and supporting the Incident Response (IR) process.
Strong understanding of threat indicators in a Windows environment, complemented by knowledge of various security tools and methodologies.

