We're partnering with a leading global provider of vacation ownership, rental, and resort experiences, who are known for their vacation club memberships, timeshare properties, and luxury travel options across a portfolio of high-end resorts and destinations. With a strong focus on customer service, they offer flexible vacation solutions such as points-based systems and exchange programs, and operate under multiple well-known hospitality brands.
They are currently undergoing a technology transformation, with a focus on modernization to improve relationships with customers and further expand their accessibility across all experiences and destinations. The goal is to be a technology leader in hospitality, and they are looking for individuals eager to bring their expertise to the organization long-term.
Under new leadership, the team has been reinvigorated and are primed for growth across their entire Global Technology organization including Engineering & Operations, Data Platforms & Engineering, Artificial Intelligence, Information Security, Privacy, Infrastructure, Products & Platforms, Delivery Office, and the Office of the CIO. The business intends to double it's spending on Technology across the organization for each of the next 3 years. This is your opportunity to be a part of the journey and drive innovation through technology adoption.
At the moment, they are looking to bring on an experienced Cyber Threat Hunter to lead their team as a Senior Analyst. This role involves safeguarding company systems and data against evolving cyber threat hunting, with a focus on incident response, proactive threat detection, and continuous improvement.
Responsibilities:
- Conduct incident response activities.
- Monitor and analyze security events.
- Investigate incidents and perform advanced threat detection and response.
- Collaborate with SOC analysts to triage and escalate security incidents.
- Fine-tune detection mechanisms and develop playbooks.
- Perform forensic analysis to determine root causes and mitigate future risks.
- Engage in continuous improvement initiatives.
- Monitor security tools and remediate alerts.
- Manage security incident tickets and adhere to service level agreements.
- Develop detection rules and document processes.
- Implement security enhancements and work closely with the Senior Threat Intelligence Analyst.
Qualifications:
- Bachelor's degree in information technology or related discipline, or equivalent work experience.
- Relevant certifications (e.g., Splunk Core Certified User, Splunk Certified Cybersecurity Defense Analyst, Certified Cyber Threat Hunter, GIAC Certified Intrusion Analyst, Certified Ethical Hacker).
- 7+ years of experience in cyber security, particularly in a Threat Intelligence or Threat Hunter role.
- Proficiency in cyber threat hunting, OSINT, and the threat intelligence life cycle.
- Knowledge of network threats, attacks, and intrusion set TTPs.
- Experience with security incident response, network forensics, and host-based forensics.
- Familiarity with EDR tools (e.g., CrowdStrike Falcon, Carbon Black) and SIEM platforms (e.g., Splunk, QRadar, Sentinel).
- Understanding of logging standards, compliance, and best practices (e.g., Sarbanes Oxley, PCI, Mitre Att&ck framework).
- Strong communication, collaboration, multi-tasking, and problem-solving skills.
This is a hybrid role out of Orlando, Florida with 3 days onsite at the client's office.
