Job description
**5X NEW ROLES** 5x Remote Sr Threat Hunter, Global Household Consultancy. $130k-$160k cash comp. Proactive Threat Hunting working with SentinelOne + Microsoft Defender. 2-5 years experience
You will join a high performing threat detection and response team in performing active threat hunting to assist organizations recover from cyber incidents. You will think like a cyber attacker to figure out how security measures were circumvented by threat actors. This is an opportunity to use your analytical skills and gain endpoint detection and response experience to identify indicators of compromise. You will work in concert with incident response analysts actively engaged in forensic investigations resulting from network compromises and ransomware deployment.
Experience;
- Experience with EDR platforms, including Carbon Black, SentinelOne, CrowdStrike, Defender for Endpoint
- Experience with conventional network- and host-based intrusion analysis, digital forensics, or handling malware
- Experience with hunt teams, cyber threat intelligence, incident response, or security operations teams
- Knowledge of security principles, including MITRE ATT@CK framework, threat landscapes, or attacker TTPs
Quick turnaround with interviews. Looking to make multiple hires, immediate of Q1 2025 Start.
Reach out with your resume to [email protected]
You will join a high performing threat detection and response team in performing active threat hunting to assist organizations recover from cyber incidents. You will think like a cyber attacker to figure out how security measures were circumvented by threat actors. This is an opportunity to use your analytical skills and gain endpoint detection and response experience to identify indicators of compromise. You will work in concert with incident response analysts actively engaged in forensic investigations resulting from network compromises and ransomware deployment.
Experience;
- Experience with EDR platforms, including Carbon Black, SentinelOne, CrowdStrike, Defender for Endpoint
- Experience with conventional network- and host-based intrusion analysis, digital forensics, or handling malware
- Experience with hunt teams, cyber threat intelligence, incident response, or security operations teams
- Knowledge of security principles, including MITRE ATT@CK framework, threat landscapes, or attacker TTPs
Quick turnaround with interviews. Looking to make multiple hires, immediate of Q1 2025 Start.
Reach out with your resume to [email protected]