Key Responsibilities
- Perform continuous and mission-based threat-hunting activities using security platforms including, but not limited to, SIEM, EDR, and NDR.
- Support and execute threat-hunting operations as directed by the Threat Hunting team lead.
- Identify, propose, and scope threat-hunting missions based on the evolving threat landscape and intelligence inputs.
- Develop hunt hypotheses, execute analysis, interpret findings, and support the full threat-hunting lifecycle through to closure.
- Translate validated hunt findings into actionable detection logic and develop corresponding rules for operational deployment.
- Produce and present comprehensive threat-hunting reports and presentations on a monthly basis, highlighting findings, trends, and recommendations.
Requirements
Experience & Qualifications
- Minimum of 2 years experience in a full-time SOC analyst, threat hunter, or related cybersecurity role.
- Demonstrated operational experience conducting threat hunting using SIEM, EDR, and NDR platforms.
- Relevant professional certifications are required, such as GMON, GCTD, GCFA, GNFA, GCFR, GCTI, GCIA, OSCP, or other equivalent credentials.
Technical & Professional Competencies
- Strong analytical skills with the ability to identify stealthy attacker techniques and anomalous behaviours.
- Experience building detections from threat-hunting hypotheses and operationalizing them within security platforms.
- Ability to document and communicate technical findings clearly to both technical and non-technical stakeholders.
Additional Requirements
- Candidate must successfully pass the Level 3 Threat Hunting technical assessment and a panel interview conducted by a joint assessment team.