Job Description
McKesson is an impact-driven, Fortune 10 company that touches virtually every
aspect of healthcare. We are known for delivering insights, products, and
services that make quality care more accessible and affordable. Here, we focus
on the health, happiness, and well-being of you and those we serve – we care.
What you do at McKesson matters. We foster a culture where you can grow, make
an impact, and are empowered to bring new ideas. Together, we thrive as we
shape the future of health for patients, our communities, and our people. If
you want to be part of tomorrow’s health today, we want to hear from you.
**Job Summary**
McKesson’s Senior Cyber Threat Hunter will be a member or our Cyber
Investigations & Response Team executing threat hunting activities across the
Enterprise. You will be responsible for participating in threat actor-based
investigations, creating new detection methodologies, and providing expert
support to incident response and monitoring functions. Your mission is to
timely detect, disrupt, and eradicate threat actors from enterprise networks.
To execute this mission, you will use data analysis, threat intelligence, and
cutting-edge security technologies. You will support the security operations
by applying analytic and technical skills to investigate possible intrusions,
identify malicious activity and potential insider threats, and collaborate
with other team members on responding to detected incidents.
- *Responsibilities**
- Execute research, analysis, and response for alerts; including log retrieval and documentation.
- Conduct analysis of network traffic and host activity across a wide array of technologies and platforms.
- Assist in incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts.
- Compile detailed investigation and analysis reports.
- Work with the Cyber Threat Intelligence (CTI) team to assist in tracking threat actors and developing countermeasures in response to those threat actors.
- Analyze malicious campaigns and evaluate effectiveness of security technologies.
- Coordinate threat hunting activities across the network leveraging intelligence from multiple internal and external sources, as well as cutting- edge security technologies.
- Perform Root Cause Analysis of security events and incidents for further enhancement of processes and detectionprevention strategies.
- Develop dashboards and reports to identify potential threats, suspiciousanomalous activity, malware, etc.
- *Requirements**
- 7+ years of relevant cyber security experience in Threat Hunting, IT Security, Incident Response or network security with strong knowledge working in a Security Operations Center, Incident Response team, or Threat Hunting team.
- Experience with risk management, vulnerability management, threat analysis, security auditing, security monitoring, incident response and other information security practices preferred
- Strong analytical and investigation skills & active threat hunting and adversary tracking.
- Excellent written and oral communication skills with the ability to effectively communicate with information technology professionals as well as senior management and auditors, assessors, and consultants
- High level of personal integrity, and the ability to professionally handle confidential matters and exude the appropriate level of judgment and maturity
- Working knowledge of lateral movement, footholds, and data exfiltration techniques
- Ability to mentor and potentially independently lead a team of global Cyber Threat Hunters.
- *Preferred Technical and Professional Expertise**
- One or more of the following security certifications or equivalent: GDAT (GIAC Defending Advanced Threats), Certified Cyber Threat Hunting Professional (CCTHP), Certified Threat Intelligence Analyst (CTIA), and GIAC Cyber Threat Intelligence (GCTI)
- Bachelor’s degree in a technical field such as Computer Science, Information Security, Information Technology, Computer Engineering, or Information Systems. or equivalent degree is preferred.
- Knowledge of the underlying logic that security alerts are built upon and apply them when analyzing raw logs and creating new dashboards and alerts.
- Experience and knowledge of packet flow, TCPUDP traffic, firewall technologies, IDS technologies, proxy technologies, and antivirus, spam and spyware solutions.
- Provide leadership and guidance to the team and act as a resource to the team members.
- Experience with one or more scripting languages (e.g., Python, JavaScript, Perl)
- Perform memory analysis and malware analysis
- Experience with computer exploitation methodologies
We are proud to offer a competitive compensation package at McKesson as part
of our Total Rewards. This is determined by several factors, including
performance, experience and skills, equity, regular job market evaluations,
and geographical markets. The pay range shown below is aligned with McKessons
pay philosophy, and pay will always be compliant with any applicable
regulations. In addition to base pay, other compensation, such as an annual
bonus or long-term incentive opportunities may be offered. For more
information regarding benefits at McKesson, please [click
here.](
**Our Base Pay Range for this position**
$116,700 - $194,500
**McKesson is an Equal Opportunity Employer**
McKesson provides equal employment opportunities to applicants and employees
and is committed to a diverse and inclusive environment without regard to
race, color, religion, sex, sexual orientation, gender identity, national
origin, protected veteran status, disability, age or genetic information. For
additional information on McKesson’s full Equal Employment Opportunity
policies, visit our [Equal Employment
Opportunity]( page.
**Join us at McKesson!**
Job Tags
Full time, Remote job,