Related skills
javascript powershell python splunk siemπ Description
- Leads threat hunting across large enterprise environments.
- Designs TTP or hypothesis hunts using cyber threat intel.
- Coordinates remediation with asset owners and incident response.
- Develops and interprets detections and analytics for hunts.
- Communicates findings to USG leadership; maintains a hunt backlog.
π― Requirements
- GCIA, GCIH or GFCA OR CEH
- Bachelor's degree in CS, Engineering, STEM, IT, or Cybersecurity
- 5+ years as Tier 3 threat hunt analyst; host and network traversal
- Forensics: threat activity, intrusion detection, malware analysis
- Scripting: VBScript, Python, PowerShell, JavaScript
- SIEM/EDR expertise; Splunk, CTI coordination with asset owners
π Benefits
- Competitive and comprehensive benefits package
- 6Hs culture: Happy, Helpful, Honest, Humble, Hungry, Hustle
- Equal Opportunity Employer/Protected Veterans/Disabilities
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest β finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!