Related skills
azure aws sql gcp siem📋 Description
- Design and execute hypothesis-driven threat hunting campaigns across cloud infrastructure, applications, and endpoints
- Identify anomalous behaviors, TTPs (Tactics, Techniques, and Procedures), and indicators of compromise (IOCs)
- Hunt for advanced persistent threats, insider threats, and supply chain compromises
- Develop custom detection logic and hunting queries (KQL, SPL, SQL) for SIEM and EDR platforms
- Continuously improve hunting methodologies based on emerging threat intelligence
🎯 Requirements
- 6+ years in cybersecurity with 4+ years focused on threat hunting, incident response, or digital forensics
- Relevant certifications: GCFA, GCFE, GNFA, GREM, OSCP, GCIA, or similar
- Hands-on experience with major security incidents and breach investigations
- Deep understanding of attacker TTPs across the cyber kill chain
- Experience in high scale cloud environments (AWS, GCP, or Azure)
- Understanding of e-commerce, payment systems, and mobile app security
🎁 Benefits
- Remote Friendly with Flex First policy
- Competitive compensation and benefits
- New hire equity grant and annual refresh grants
- Base pay ranges listed by location in the job posting
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest — finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!