
Threat Hunter
RapDev
full-time
Posted on:
Location Type: Hybrid
Location: Boston • Massachusetts • United States
Visit company websiteExplore more
Salary
💰 $90,000 - $135,000 per year
Tech Stack
About the role
- Lead the maturation of the Security Operations Team’s threat hunting practice
- Proactively hunt for indicators of compromise (IOCs) across the network, endpoints, and cloud environments using threat intelligence and industry-standard hunting methodologies
- Develop and execute complex searches across various data sets and apply macro data analysis skills to uncover anomalies.
- Produce routine reporting for hunts executed, including technical reports at the completion of a hunt with substantive findings and semi-annual executive summary reports
- Utilize various security and observability platform features in hunts for increased fidelity and better context.
- Develop and refine threat hunting playbooks, procedures, and detection rules to improve the security team’s efficiency and effectiveness
- Leverage automation and AI solutions to support and scale human-led hunt operations across client environments.
- Collaborate with the Security Operations Team to integrate new threat intelligence and enhance existing security tools and controls
- Mentor junior analysts and contribute to the ongoing improvement of the organization's overall security posture
Requirements
- 2-4 years of experience in a technical role in the areas of Security Operations, Incident Response, Detection Engineering, Offensive Security/Red Team, or Cyber Threat Intelligence
- Proven, hands-on experience proactive security operations and threat hunting including a deep understanding of incident response frameworks, methodologies, and forensic techniques
- Exceptional analytical and problem-solving skills with keen attention to detail with the ability to work independently with minimal supervision and manage multiple investigations simultaneously
- Strong communication skills, capable of presenting complex technical information clearly to both technical and non-technical audiences
- A proactive mindset and a passion for continuous learning in the rapidly evolving field of cybersecurity
- Experience analyzing endpoint, network, cloud, and application logging for attack techniques at all stages of the cyber kill chain
- Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways
- Ability to apply Cyber Threat Intelligence through enrichment, correlation, and attribution
- Ability to see the larger picture when dealing with competing requirements and needs from across the organization in order to build consensus and drive results
- Ability to navigate and work effectively across a complex, geographically dispersed organization
- Demonstrated ability to self-direct, with minimal supervision to achieve assigned goals
- Experience performing security analysis and threat hunting in Cloud environments preferred.
Benefits
- 100% Employee Healthcare Coverage (Medical, Dental & Vision)
- Retirement Plan (5% 401k Match, IRA)
- Unlimited Paid Time Off (4-week minimum) (Vacation, Sick & Public Holidays)
- Family Leave (Maternity, Paternity)
- Equity
- Hybrid Work Opportunities
- Fitness & Commuter Subsidies available
- SL & LT Disability
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
threat huntingindicators of compromisedata analysisincident response frameworksforensic techniquessecurity operationsdetection engineeringCyber Threat IntelligenceautomationAI solutions
Soft Skills
analytical skillsproblem-solving skillsattention to detailcommunication skillsproactive mindsetcontinuous learningability to build consensusself-directionindependencecollaboration