Tier III Analyst/Threat Hunter

Added
3 minutes ago
Type
Full time
Salary
Salary not provided

Related skills

malware_analysis

📋 Description

  • Lead complex incident investigations and provide advanced analysis and response support.
  • Conduct proactive threat hunting activities to identify emerging threats and adversary behavior.
  • Perform root cause analysis and develop detailed incident reports.
  • Support digital forensics and malware analysis efforts.
  • Analyze endpoint, network, and identity telemetry to detect anomalous behavior.
  • Integrate threat intelligence and red team findings into detection and response workflows.

🎯 Requirements

  • Must be a U.S. Citizen.
  • Bachelor’s degree in Cybersecurity, Information Technology, or a related field (or equivalent experience).
  • 4+ years of experience in cybersecurity operations or incident response.
  • Experience handling complex security incidents and conducting threat investigations.
  • Experience performing threat hunting and root cause analysis.
  • Experience with SIEM platforms, preferably Microsoft Sentinel.

🎁 Benefits

  • Highly competitive benefits
  • Professional development opportunities
  • Flexible, collaborative culture and career growth
  • Remote/hybrid work environment
  • Equal opportunity employer
Share job

Meet JobCopilot: Your Personal AI Job Hunter

Automatically Apply to Operations Jobs. Just set your preferences and Job Copilot will do the rest — finding, filtering, and applying while you focus on what matters.

Related Operations Jobs

See more Operations jobs →