Related skills
powershell aws python splunk threat hunting๐ Description
- Lead CTI program; track adversaries and campaigns
- Monitor threat landscape via telemetry, feeds, OSINT
- Produce actionable intel for security operations, engineering, leadership
- Conduct hypothesis-driven threat hunting using intel methods
- Map adversary activity to MITRE ATT&CK to identify gaps
- Correlate threat intel with incidents to guide risk-based decisions
๐ฏ Requirements
- 5โ7 years in information security/tech; 3+ years in senior/advanced analyst
- MITRE ATT&CK practical application in enterprise environments
- CTI methods and threat hunting frameworks (Sqrrl, TaHiTi, PEAK)
- SIEM experience: Google Chronicle and Splunk; CTI solutions
- Scripting/automation: Python, Bash, PowerShell
- Cloud security: AWS, Azure, GCP; exec summaries; risk balance
๐ Benefits
- Equal Opportunity Employer; diversity valued
- Mentorship and growth opportunities
- Collaborative, security-focused team culture
- Comprehensive privacy notices for applicants
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest โ finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!