Search by job, company or skills

  • Posted a month ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Key Responsibilities

  • Perform continuous and mission-based threat-hunting activities using security platforms including, but not limited to, SIEM, EDR, and NDR.
  • Support and execute threat-hunting operations as directed by the Threat Hunting team lead.
  • Identify, propose, and scope threat-hunting missions based on the evolving threat landscape and intelligence inputs.
  • Develop hunt hypotheses, execute analysis, interpret findings, and support the full threat-hunting lifecycle through to closure.
  • Translate validated hunt findings into actionable detection logic and develop corresponding rules for operational deployment.
  • Produce and present comprehensive threat-hunting reports and presentations on a monthly basis, highlighting findings, trends, and recommendations.

Requirements

Experience & Qualifications

  • Minimum of 2 years experience in a full-time SOC analyst, threat hunter, or related cybersecurity role.
  • Demonstrated operational experience conducting threat hunting using SIEM, EDR, and NDR platforms.
  • Relevant professional certifications are required, such as GMON, GCTD, GCFA, GNFA, GCFR, GCTI, GCIA, OSCP, or other equivalent credentials.

Technical & Professional Competencies

  • Strong analytical skills with the ability to identify stealthy attacker techniques and anomalous behaviours.
  • Experience building detections from threat-hunting hypotheses and operationalizing them within security platforms.
  • Ability to document and communicate technical findings clearly to both technical and non-technical stakeholders.

Additional Requirements

  • Candidate must successfully pass the Level 3 Threat Hunting technical assessment and a panel interview conducted by a joint assessment team.

More Info

Job Type:
Industry:
Function:
Employment Type:

About Company

Job ID: 141304879