Key Responsibilities

  • Conduct proactive threat hunting and threat intelligence analysis across endpoint, identity, cloud, and network data.
  • Investigate and support response to high‑priority security incidents, using MITRE ATT&CK and real‑world threat insights.
  • Collaborate with Vulnerability Management to prioritize vulnerabilities and assess exposure, misconfigurations, and attack paths.
  • Convert intelligence and hunting results into actionable detection and response improvements.
  • Prepare clear documentation and coordinate investigations with SOC, IT, Legal, Compliance, and other teams.

Requirements

  • 2–6 years of experience in Threat Hunting, Threat Intelligence, or Incident Response.
  • Strong hands‑on knowledge of EDR tools and SIEM/log analytics.
  • Solid understanding of exploitation, exposure management, and attacker techniques.
  • Ability to work independently, think critically, and operate under pressure.
  • Strong communication skills; no people‑management responsibilities.

Education & Certifications

  • Degree in Cybersecurity/Computer Science or equivalent experience.
  • Practical experience may substitute for formal education.
  • Preferred certifications: GIAC (GCIA, GCIH, GCED, GCIR, GNFA, GCFA), OSCP/OSCE, CRTO/CRTP/CRTA, DFIR (GCFA, GNFA, CFCE, EnCE).

 

 
Aplikuj