Key Responsibilities
- Conduct proactive threat hunting and threat intelligence analysis across endpoint, identity, cloud, and network data.
- Investigate and support response to high‑priority security incidents, using MITRE ATT&CK and real‑world threat insights.
- Collaborate with Vulnerability Management to prioritize vulnerabilities and assess exposure, misconfigurations, and attack paths.
- Convert intelligence and hunting results into actionable detection and response improvements.
- Prepare clear documentation and coordinate investigations with SOC, IT, Legal, Compliance, and other teams.
Requirements
- 2–6 years of experience in Threat Hunting, Threat Intelligence, or Incident Response.
- Strong hands‑on knowledge of EDR tools and SIEM/log analytics.
- Solid understanding of exploitation, exposure management, and attacker techniques.
- Ability to work independently, think critically, and operate under pressure.
- Strong communication skills; no people‑management responsibilities.
Education & Certifications
- Degree in Cybersecurity/Computer Science or equivalent experience.
- Practical experience may substitute for formal education.
- Preferred certifications: GIAC (GCIA, GCIH, GCED, GCIR, GNFA, GCFA), OSCP/OSCE, CRTO/CRTP/CRTA, DFIR (GCFA, GNFA, CFCE, EnCE).