
Senior Threat Hunter
Armis
full-time
Posted on:
Location Type: Remote
Location: United States
Visit company websiteExplore more
Job Level
Tech Stack
About the role
- Lead proactive threat hunts to identify patterns, anomalies, and behaviors associated with known and emerging adversary TTPs.
- Configure and optimize advanced security tools to enhance detection fidelity and coverage.
- Lead and execute complex threat investigations across customer environments.
- Provide analytical support throughout the full incident lifecycle, including identification, containment, eradication, and recovery.
- Research emerging threats and adversary techniques to develop actionable intelligence and effective detection strategies.
- Translate intelligence into practical hunting methodologies and detection improvements.
- Produce detailed technical incident reports and contribute to executive-level summaries.
- Clearly communicate findings, risk, and remediation guidance to both technical and executive stakeholders.
- Develop and maintain Armis platform policies, dashboards, and customer-specific monitoring use cases.
- Partner with internal teams to automate workflows, enhance tooling, and improve service delivery efficiency.
- Design and maintain standardized, reusable threat hunting playbooks to scale and operationalize MTS capabilities.
- Contribute feedback and prioritization input to product and feature development.
- Serve as a trusted advisor and thought leader for assigned customers on risk management, detection optimization, and response maturity.
- Act as a recognized subject matter expert internally and externally.
- Coach and mentor junior team members, fostering technical growth, collaboration, and continuous learning.
Requirements
- Bachelor’s degree in Cybersecurity, Computer Science, or a related field (preferred).
- 8+ years of professional cybersecurity experience, ideally in threat hunting, threat intelligence, incident response, or SOC operations.
- Deep understanding of network infrastructure, operating systems, and common attack vectors.
- Strong experience mapping adversary behavior using MITRE ATT&CK and Cyber Kill Chain frameworks.
- Advanced expertise analyzing logs, endpoint telemetry, IDS/IPS data, and network traffic (NetFlow, PCAP).
- Experience with malware analysis (static and dynamic) and IOC development.
- Solid knowledge of security controls, detection engineering, and risk-based mitigation strategies.
- Excellent written and verbal communication skills, with the ability to translate complex findings into actionable guidance.
- Proven ability to operate independently and lead engagements in distributed, cross-functional environments.
- U.S. citizenship required.
Benefits
- Comprehensive health benefits
- Discretionary time off
- Paid holidays including monthly me days
- Highly inclusive and diverse workplace
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
threat huntingthreat intelligenceincident responseSOC operationsMITRE ATT&CKCyber Kill Chainmalware analysislog analysisendpoint telemetrynetwork traffic analysis
Soft Skills
communicationleadershipmentoringcollaborationanalytical thinkingproblem-solvingindependencecoachingtechnical growthstakeholder engagement