
Threat Hunter
TENEX.AI
full-time
Posted on:
Location Type: Hybrid
Location: Kansas City • Kansas • Montana • United States
Visit company websiteExplore more
Tech Stack
About the role
- Proactively search for indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) used by threat actors.
- Analyze and correlate security telemetry from various sources, including SIEM, EDR, network logs, and threat intelligence feeds.
- Conduct threat modeling and hypothesis-driven investigations to uncover hidden threats.
- Collaborate with SOC analysts and incident responders to investigate and contain security incidents.
- Develop and refine detection rules, signatures, and threat hunting methodologies.
- Stay ahead of emerging threats by researching new attack vectors, adversary techniques, and malware trends.
- Provide detailed reports on findings, including mitigation strategies and recommendations.
- Monitor security alerts and events across the enterprise network, using both traditional cybersecurity tools and AI/ML-powered threat detection systems.
- Investigate and analyze security incidents and breaches, leveraging AI to automate initial analysis and enhance threat hunting efforts.
- Work with Google SecOps platform tools to streamline security operations, improve threat visibility, and automate workflows.
Requirements
- 3+ years of experience in a Threat Hunting, Security Operations Center (SOC) or a similar security-focused role
- Strong understanding of attacker methodologies, malware analysis, and digital forensics
- Hands-on experience with security tools such as SIEM, EDR, SOAR, and forensic analysis platforms
- Proficiency in scripting languages (Python, PowerShell, etc.) for automating threat detection and analysis
- Interest in applying automation and/or artificial intelligence and machine learning techniques to cybersecurity tasks, such as threat detection, anomaly detection, and security automation
- Hands-on experience with security analytics, log management, threat hunting, and incident response
- Hands-on experience with Google SecOps platform (Google Chronicle) is a strong plus
- Hands-on experience with the Microsoft security platform (Sentinel, Defender) is a plus
- Relevant certifications (e.g., CISSP, CISM, CEH) are a plus.
- Bachelor’s degree in Computer Science, Information Security, or a related field, or equivalent work experience.
Benefits
- Competitive salary and benefits package
- A culture of growth and development, with opportunities to expand your knowledge in AI, cybersecurity, and emerging technologies
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
threat huntingsecurity operationsmalware analysisdigital forensicsscripting (Python, PowerShell)security analyticslog managementincident responsethreat detectionanomaly detection
Soft Skills
collaborationcommunicationproblem-solvinganalytical thinkingreport writing
Certifications
CISSPCISMCEH