Threat Hunter and Incident Responder
Join the fight against cyber threats by leveraging advanced threat hunting methodologies to identify and neutralize hidden adversary activity. Your mission is to track APT groups within customer networks and investigate critical incidents with forensic precision.
Key Responsibilities :
- Conduct proactive threat hunting across endpoints, networks, and cloud environments to detect anomalies, suspicious behaviors, and emerging attack techniques.
- Analyze logs, telemetry, and threat intelligence to develop and refine detection rules and queries aligned with MITRE ATT&CK tactics and techniques.
- Lead and support incident response investigations, including triage, containment, root-cause identification, and remediation.
- Perform host- and network-level analysis (malware, memory, packet captures, system artifacts) to assess the scope and impact of intrusions.
Required Skills and Qualifications :
Strong knowledge of operating systems internals (Windows, Linux, macOS) and network protocols (TCP / IP, DNS).Proficiency with SIEM, EDR, and log analysis platforms (e.g., Splunk, Sentinel, Elastic, CrowdStrike, Carbon Black).Hands-on experience with incident response : triage, containment, forensics, and malware analysis.Ability to analyze artifacts and evidence (registry, memory, disk, logs, network captures).Education and Training Skills :
Bachelor's degree in Computer Science, Cybersecurity, Engineering, or equivalent experience.3–5+ years of experience in cybersecurity, ideally within Threat Hunting, Incident Response, or DFIR roles.