McKesson is an impact-driven, Fortune 10 company that touches virtually every aspect of healthcare. We are known for delivering insights, products, and services that make quality care more accessible and affordable. Here, we focus on the health, happiness, and well-being of you and those we serve – we care.
What you do at McKesson matters. We foster a culture where you can grow, make an impact, and are empowered to bring new ideas. Together, we thrive as we shape the future of health for patients, our communities, and our people. If you want to be part of tomorrow’s health today, we want to hear from you.
Job Summary
McKesson’s Senior Cyber Threat Hunter will be a member or our Cyber Investigations & Response Team executing threat hunting activities across the Enterprise. You will be responsible for participating in threat actor-based investigations, creating new detection methodologies, and providing expert support to incident response and monitoring functions. Your mission is to timely detect, disrupt, and eradicate threat actors from enterprise networks. To execute this mission, you will use data analysis, threat intelligence, and cutting-edge security technologies. You will support the security operations by applying analytic and technical skills to investigate possible intrusions, identify malicious activity and potential insider threats, and collaborate with other team members on responding to detected incidents.
Want more jobs like this?
Get jobs in Irving, TX delivered to your inbox every week.
Responsibilities
Execute research, analysis, and response for alerts; including log retrieval and documentation.
Conduct analysis of network traffic and host activity across a wide array of technologies and platforms.
Assist in incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts.
Compile detailed investigation and analysis reports.
Work with the Cyber Threat Intelligence (CTI) team to assist in tracking threat actors and developing countermeasures in response to those threat actors.
Analyze malicious campaigns and evaluate effectiveness of security technologies.
Coordinate threat hunting activities across the network leveraging intelligence from multiple internal and external sources, as well as cutting- edge security technologies.
Perform Root Cause Analysis of security events and incidents for further enhancement of processes and detection/prevention strategies.
Develop dashboards and reports to identify potential threats, suspicious/anomalous activity, malware, etc.
Requirements
7+ years of relevant cyber security experience in Threat Hunting, IT Security, Incident Response or network security with strong knowledge working in a Security Operations Center, Incident Response team, or Threat Hunting team.
Experience with risk management, vulnerability management, threat analysis, security auditing, security monitoring, incident response and other information security practices preferred
Strong analytical and investigation skills & active threat hunting and adversary tracking.
Excellent written and oral communication skills with the ability to effectively communicate with information technology professionals as well as senior management and auditors, assessors, and consultants
High level of personal integrity, and the ability to professionally handle confidential matters and exude the appropriate level of judgment and maturity
Working knowledge of lateral movement, footholds, and data exfiltration techniques
Ability to mentor and potentially independently lead a team of global Cyber Threat Hunters.
Preferred Technical and Professional Expertise
One or more of the following security certifications or equivalent: GDAT (GIAC Defending Advanced Threats), Certified Cyber Threat Hunting Professional (CCTHP), Certified Threat Intelligence Analyst (CTIA), and GIAC Cyber Threat Intelligence (GCTI)
Bachelor’s degree in a technical field such as Computer Science, Information Security, Information Technology, Computer Engineering, or Information Systems. or equivalent degree is preferred.
Knowledge of the underlying logic that security alerts are built upon and apply them when analyzing raw logs and creating new dashboards and alerts.
Experience and knowledge of packet flow, TCP/UDP traffic, firewall technologies, IDS technologies, proxy technologies, and antivirus, spam and spyware solutions.
Provide leadership and guidance to the team and act as a resource to the team members.
Experience with one or more scripting languages (e.g., Python, JavaScript, Perl)
Perform memory analysis and malware analysis
Experience with computer exploitation methodologies
We are proud to offer a competitive compensation package at McKesson as part of our Total Rewards. This is determined by several factors, including performance, experience and skills, equity, regular job market evaluations, and geographical markets. The pay range shown below is aligned with McKesson's pay philosophy, and pay will always be compliant with any applicable regulations. In addition to base pay, other compensation, such as an annual bonus or long-term incentive opportunities may be offered. For more information regarding benefits at McKesson, please click here.
Our Base Pay Range for this position
$116,700 - $194,500
McKesson is an Equal Opportunity Employer
McKesson provides equal employment opportunities to applicants and employees and is committed to a diverse and inclusive environment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability, age or genetic information. For additional information on McKesson’s full Equal Employment Opportunity policies, visit our Equal Employment Opportunity page.
Join us at McKesson!