
Security Analyst III, Threat Hunting
Bolster, Inc
full-time
Posted on:
Location Type: Hybrid
Location: Noida • 🇮🇳 India
Visit company websiteJob Level
Mid-LevelSenior
About the role
- Lead end-to-end investigations into advanced phishing, scam, and impersonation campaigns across web, social media, and dark web.
- Analyze phishing infrastructure including domains, hosting, redirects, phishing kits, cloaking techniques, and attacker tooling.
- Triage and handle high-risk customer escalations and complex threat cases independently.
- Collaborate with Threat Hunting, SOC, Sales, Marketing, and Product teams to support customer outcomes and detection improvements.
- Mentor and guide L1/L2 analysts; support onboarding and knowledge sharing.
- Analyze large-scale phishing datasets to derive trends, metrics, and actionable insights.
- Contribute to improving and training Bolster’s automated phishing and scam detection engines.
- Propose and drive process improvements, automation ideas, and workflow optimizations.
- Create high-quality customer-facing reports and threat intelligence summaries.
Requirements
- 5+ years of hands-on experience in phishing, scam, or brand-abuse threat hunting.
- Strong understanding of threat hunting methodologies and the threat intelligence lifecycle.
- Experience analyzing phishing emails, websites, SMS, ads, and social media abuse.
- Familiarity with phishing kits, domain abuse, hosting analysis, and attacker infrastructure.
- Experience working with OSINT tools and datasets.
- Ability to work independently in a fast-paced, SLA-driven environment.
- Strong written and verbal communication skills (customer-facing).
- Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent experience).
- Prior experience in a startup or high-growth environment is a plus
Benefits
- PLEASE NOTE THAT THIS ROLE REQUIRES IN OFFICE COLLABORATION/ATTENDANCE 3X A WEEK
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
phishing analysisscam detectionthreat hunting methodologiesthreat intelligence lifecycleOSINT toolsdata analysisprocess improvementautomationworkflow optimizationcustomer-facing reporting
Soft skills
independent workcommunication skillsmentoringcollaborationproblem-solvingknowledge sharingcustomer serviceleadershipadaptabilitytime management