CO Salary Range: USD 110,100.00 - 157,300.00 per year
Company Summary
DISH, an EchoStar company, has been reimagining the future of connectivity for more than 40 years. Our business reach spans satellite television service, live-streaming and on-demand programming, smart home installation services, mobile plans and products and now we are building America's First Smart Network™.
Today, our brands include EchoStar, Hughes, DISH TV, Sling TV, Boost Mobile and Gen Mobile.
Department Summary
Our Technology teams challenge the status quo and reimagine capabilities across industries. Whether through research and development, technology innovation or solution engineering, our people play vital roles in connecting consumers with the products and platforms of tomorrow.
Want more jobs like this?
Get Computer and IT jobs in Littleton, CO delivered to your inbox every week.
Job Duties and Responsibilities
The Threat Security Architect will curate, collect, analyze and prioritize open and close source threat feeds to identify relevant threats and search for Indicators Of Compromise (IOCs) signs and Tactics, Techniques and Procedures (TTPs) within the DISH environment.
Key Responsibilities:
- Actively contribute in the development of tools, frameworks, services and guidelines to analyze and respond to threats, and in supporting operational functions on CTI-matters as needed (DFIR, Security Operations, Malware Analysis etc.)
- Periodically assess and evaluate emerging CTI-related products- and platforms, and be a knowledge expert on the quality of- and how such technologies can be used
- Conduct threat research using open- and closed sources, and maintain Intelligence KBs to effectively track known TTPs, detection coverage, and response/mitigation recommendations associated with specific threats and adversary tradecraft
- Provide curated intelligence to support operational functions, such as Threat Hunting for executing threat hunting missions and Detection Engineering for the development of use cases of new emerging adversary behavior
- Consume and analyze technical-oriented Threat Intelligence from a variety of sources (e.g. social media, blog posts, intelligence reports, sandbox output, partner sharing, internal detections etc) to track and report on the evolving threat landscape, e.g. TTPs
- Researching and analyzing malware, attack campaigns, threat groups and their tactics, techniques and procedures (TTP) as observed in the threat landscape
- Participate in the processes for collecting, enriching, assessing and distributing Threat Intelligence data and reporting; incl. the use and evaluation of supporting technologies, such Threat Intelligence Platforms (TIP)
- Assist incident responders, threat hunters and intrusion analysts in pivoting network - log and endpoint - data in the investigation of targeted attacks and serious profiteering campaigns against mnemonic's customers
Education and Experience:
- Bachelor's degree in Computer Science or Information Technology, related discipline, or commensurate industry experience
Skills and Qualifications:
- Strong understanding of cyber security principles, concepts, and technologies
- Knowledge of CTI frameworks
- Experience with vulnerability assessment and penetration testing tools
- Excellent analytical and problem-solving skills, with the ability to think critically and make informed decisions
- Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams
- Self-motivated and eager to learn, with a strong passion for cyber security
- Prior experience in a related role or internship is preferred but not mandatory
Compensation: $110,100.00/Year - $157,300.00/Year
Benefits
We offer versatile health perks, including flexible spending accounts, HSA, a 401(k) Plan with company match, ESPP, career opportunities, and a flexible time away plan; all benefits can be viewed here: DISH Benefits.
The base pay range shown is a guideline. Individual total compensation will vary based on factors such as qualifications, skill level, and competencies; compensation is based on the role's location and is subject to change based on work location. Candidates need to successfully complete a pre-employment screen, which may include a drug test and DMV check.
The posting will be active for a minimum of 3 days. The active posting will continue to extend by 3 days until the position is filled.