drjobs Cybersecurity Threat Hunter

Cybersecurity Threat Hunter

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

San Jose, CA - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Are you ready to make an impact

West Monroe isnt a start-up firm but we act like one.

From day one our people have the opportunity to make a definitive personal impact for their clients and their careers. What does this mean It means we seek out the best of the best and then we challenge them to make us better.

If you are looking to be a behind the scenes technologist this isnt the place for you. We celebrate driven professionals who thrive in a collaborative environment. We are a team of enthusiasts who are always focused on improving our execution and our clients performance. Sound interesting Then West Monroe Partners might be the place for you.

Think youre up to the challenge

West Monroe is currently seeking a Cybersecurity Threat Hunter to proactively identify analyze and mitigate advanced cyber threats targeting our organization. This role is integral to our security operations team focusing on threat hunting incident response forensic investigations and recovery efforts to strengthen our cybersecurity resilience. The ideal candidate possesses a deep technical understanding of adversary tactics techniques and procedures (TTPs) along with hands-on experience in cyber incident detection containment and remediation.

Qualifications:

  • 5 years of experience in cybersecurity roles with a focus on threat hunting incident response and forensic investigations.
  • Deep understanding of cyber attack lifecycle adversary behaviors and advanced threats (e.g. MITRE ATT&CK Cyber Kill Chain).
  • Experience with SIEM (Splunk Azure Sentinel.) EDR (CyberReason Microsoft Defender.) SOAR and forensic tools.
  • Proficiency in log analysis network traffic analysis (PCAP NetFlow) and endpoint telemetry for threat detection.
  • Hands-on expertise in memory forensics disk forensics malware analysis and triage investigations.
  • Strong scripting and automation skills (Python PowerShell Bash etc.).
  • Knowledge of cloud security principles (AWS Azure GCP) and cloud-native threat detection methodologies.
  • Ability to work under pressure and rapidly respond to high-severity security incidents.

Specific skills include but are not limited to the ability to:

Proactive Threat Hunting & Threat Intelligence

  • Conduct proactive threat-hunting using SIEM EDR and threat intelligence platforms to detect indicators of compromise (IOCs) and advanced persistent threats (APTs).
  • Develop custom detection rules and analytics based on MITRE ATT&CK TTPs and anomaly-based behaviors.
  • Identify gaps in security monitoring and work with SOC and engineering teams to improve detection capabilities.
  • Ability to correlate threat intelligence with internal telemetry to identify emerging threats.

Incident Response & Recovery

  • Lead incident response investigations including root cause analysis containment eradication and recovery of impacted systems.
  • Perform digital forensics and malware analysis to understand attack vectors and minimize dwell time.
  • Develop and maintain incident response playbooks forensic methodologies and breach response strategies.
  • Collaborate with cross-functional teams to ensure effective business recovery and resilience following security incidents.

Security Analytics & Automation

  • Leverage SIEM SOAR and EDR/XDR solutions to correlate security events and streamline threat-hunting workflows.
  • Automate common investigative tasks to improve efficiency and reduce manual overhead.
  • Continuously assess and refine incident detection and response procedures to stay ahead of evolving threats.
  • Experience securing and monitoring network protocols (e.g. DNS HTTP SMB) to identify abnormal traffic patterns.

Vulnerability & Risk Management

  • Work closely with vulnerability management teams internally and with external MSSP partners to identify and prioritize remediations based on real-world exploitability.
  • Assess and improve endpoint network and cloud security configurations to mitigate security risks.

Collaboration & Reporting

  • Provide management-level briefings and technical reports on threat hunting findings incidents and security trends.
  • Collaborate with MSSP security architects and SOC analysts to enhance defensive security strategies.
  • Participate in tabletop exercises purple team engagements and post-mortem reviews to enhance incident response preparedness.

Education & Certification Requirements

Required Education:

  • Bachelors degree in Cybersecurity Computer Science Information Security or a related field.
  • Equivalent work experience may be considered in lieu of a degree for highly qualified candidates.

Required Certifications (At least one):

  • GIAC Certifications: GCIH (Incident Handler) GCFA (Forensic Analyst) GNFA (Network Forensics) GREM (Reverse Engineering Malware) or GCIA (Intrusion Analyst).
  • Offensive Security Certifications: OSCP CRTO GPEN or similar.
  • Cloud Security Certifications: AWS Security Specialty Azure Security Engineer or equivalent.

Preferred Certifications (Bonus):

  • CISSP CISM or other industry-recognized security certifications.
  • CEH CHFI or similar for additional forensic and ethical hacking expertise.

Based on pay transparency guidelines the salary range for this role can vary. Information on our competitive total rewards package including our bonus structure and benefits is here. Individual salaries are determined by evaluating a variety of factors including geography experience skills education and internal equity. An estimated base salary for this role is below:

Other consultancies talk at you.
At West Monroe we work with you.

Were a global business and technology consulting firm passionate about creating measurable value for our clients delivering real-world solutions.

The combination of business and technology is not new but how we bring them together is unique. Were fluent in both. We know that technology alone is not the answer but how we apply it is. We rely on data to constantly adapt and solve new challenges. Actions that work today with outcomes that generate value for years to come.

At West Monroe we zero in on the heart of the opportunity getting to results faster and preparing people for whats next.

Youll feel the difference in how we work. We show up personally. Were right there in the room with you co-creating through the challenges. With West Monroe collaboration isnt a lofty promise but a daily action. We work together with you to turn vision into clear action with lasting impact.

West Monroeis an Equal Employment Opportunity Employer
We believe in treating each employee and applicant for employment fairly and with dignity. We base our employment decisions on merit experience and potential without regard to race color national origin sex sexual orientation gender identity marital status age religion disability veteran status or any other characteristic prohibited by federal state or local law. To learn more about diversity equity and inclusion at West Monroe visit
If you require a reasonable accommodation to participate in our recruiting process please inquire by sending an email to .

Please review our current policy regarding use of generative artificial intelligence during the application process.

If you are based in California we encourage you to read West Monroes Notice at Collection for California residents provided pursuant to the California Consumer Privacy Act (CCPA) and linkedhere.

Employment Type

Full Time

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.