Why join Stryker?
We are proud to be named one the World's Best Workplaces and a Best Workplace for Diversity by Fortune Magazine! Learn more about our award-winning organization by visiting stryker.com
Our total rewards package offering includes bonuses, healthcare, insurance benefits, retirement programs, wellness programs, as well as service and performance awards - not to mention various social and recreational activities, all of which are location specific.
Know someone at Stryker?
Be sure to have them submit you as a referrral prior to applying for this position. Learn more about our employee referral program
Position Summary
Develops and executes tactical hunt plans consisting of intelligence-driven hypotheses and relevant queries across the enterprise infrastructure and systems to detect and illuminate attacks, attempts to infiltrate company systems, access data, or pose a threat to systems. Research and design queries to accomplish plans and document findings in accordance with current policies and procedures. Provide information to their team and management regarding the findings of their hunt operations.
This is an individual contributor role that requires critical thinking in the application of professional expertise and is expected to work independently with minimal supervision. Job requires an understanding and application of procedures and concepts of the cybersecurity discipline.The job requires attention to detail in making evaluative judgements based on the analysis of factual information. This job typically requires information technology experience or equivalent and a minimum of 2 or more years cybersecurity experience.
Essential Duties and Responsibilities
Conducts hunt missions of Stryker assets and infrastructure using threat intelligence, analysis of probable threat actors, and domain expertise to detect and eradicate threats.Participates in hypothesis development process to direct hunt operations toward relevant risks to Stryker data and access.Exploration, and recommendation of new cybersecurity Hunting tools, processes, and capabilities.Delivers queries and resultant data to team leads to aid in the tuning and development detection capabilities.On requests helps in the investigation of events of interest identified during threat hunt activities or security alerts received from various security technologies.Develop and maintain a strong understanding of advanced threats, response, and detection techniques used in cybersecurity operations.Effectively communicate technical findings to customer team members and leadership.Collaborate with Security Operations Centers, IS Service Desk, and IS Deskside resources as needed.Assists in implementing systems or tools related to threat hunting.Proactively drive threat hunting and analysis on behalf of Stryker.Leverage internal and external resources to research threats, vulnerabilities, and detection logic for various threat actors and their TTPs.Make use of all security tools available to identify threats, determine the root cause, scope, and severity of each anomaly, escalating as required.Report on findings and recommend system tuning/customization and data collection improvements.Create new detection developing advanced queries to detect threats and respond to red team assessments, providing logic to improve detection.Develop and provide technical reports for activities and incidents to help maintain day-to-day status, develop and report on trends.Use the MITRE ATT&CK framework to analyze malicious campaigns and evaluate the detection methodology.
Education and Certification
BS in Computer Information Security or Information Systems or equivalent
Security certifications such as CompTIA, EC-Council, or GIAC preferred
Qualifications and Experience
Experience: Minimum 2 years of cybersecurity experience.Knowledge of current MITRE tactics, techniques, and procedures, vulnerabilities, data breach incidents, and security analysis techniques.Knowledge of malware, botnets, threats, and various attack campaigns.Demonstrated experience with Windows and/or Unix/Linux operating systems including command-line tasks and scriptingDemonstrated technical experience with Networking (eg. data flows, architecture, protocols, traffic analysis, wireless, etc.)Experience working with cyber threat intelligence, security incident response, and forensic investigation teams preferred.Red Team/Blue Team/Incident Response experience preferred.Proven ability to partner with staff and leads in the Information Security and Information Services organizationsDemonstrated interpersonal skills, including briefing skills
Physical and Mental Requirements
Demonstrated ability to solve complex problems and identify cybersecurity solutions to challenging technical problems.Demonstrated ability to manage, organize, and prioritize individual workloadDemonstrated ability to report on the progress of activitiesDemonstrated strong analytical skillsStrong written and verbal communication
About Stryker
Stryker is one of the world's leading medical technology companies and, together with our customers, is driven to make healthcare better.
The company offers innovative products and services in Medical and Surgical, Neurotechnology, Orthopedics, and Spine that help improve patient and healthcare outcomes. Alongside its customers around the world, Stryker impacts more than 100 million patients annually.
More information is available at stryker.com