If you need support in completing the application or if you require a different format of this document please get in touch with at with the subject line: Application Support Request.Role: SOC Analyst Threat Hunter
Job Type:Permanent
Location:Letterkenny OnsiteJoin a global tech leader right here in Donegal. With over 850 employees and a state-of-the-art global delivery centre were proud to offer world-class career opportunities without having to leave the Northwest. Recognised as Workplace of the Year by the Letterkenny Chamber we foster a culture of continuous learning innovation and respect. Our people are at the heart of everything we do collaborating across teams geographies and disciplines to drive real change for clients around the world. Be part of something global grounded in Donegal.Careers at TCS: It means moreTCS is a purpose-led transformation company built on belief. We do not just help businesses to transform through technology. We support them in making a meaningful difference to the people and communities they serve - our clients include some of the biggest brands in the UK and worldwide. For you it means more to make an impact that matters through challenging projects which demand ambitious innovation and thought leadership.- Gain access to endlesslearning opportunities.
- Fast track your growth with diverse career opportunities internally.
- Grow your career while being exposed to new technologies.
The RoleAs a Threat Hunter your primary responsibility is to proactively identify and mitigate advanced threats that evade traditional security controls. You continuously search for indicators of compromise and malicious activity across networks endpoints and cloud environments. Using hypothesis-driven investigations you will analyse patterns anomalies and behaviours to uncover stealthy attackers and advanced persistent threats. You will leverage threat intelligence SIEM platforms and behavioural analytics to develop detection strategies and improve SOC capabilities. Collaborate with the incident response teams to validate findings and remediate threats effectively. You will create and refine hunting queries detection rules and automation playbooks to strengthen defences. Staying ahead of emerging attack techniques and integrating new intelligence into hunting methodologies. You will perform root cause analysis and provide actionable insights to enhance security posture. Your role drives continuous improvement by closing detection gaps and reducing dwell time.Your responsibilities:Key Responsibilities:- Proactively hunt for advanced threats APTs and indicators of compromise across networks endpoints and cloud environments.
- Develop and execute hypothesis-driven investigations to uncover stealthy attacks that evade traditional detection.
- Leverage SIEM platforms (e.g. Microsoft Sentinel) and threat intelligence feeds to identify anomalies and suspicious patterns.
- Create and refine detection rules queries and automation playbooks to improve SOC detection capabilities.
- Perform deep-dive analysis of logs network traffic and endpoint telemetry to identify malicious activity.
- Collaborate with incident response teams to validate findings and assist in remediation efforts.
- Integrate emerging threat intelligence into hunting strategies and detection mechanisms.
- Conduct root cause analysis and provide actionable recommendations to strengthen security posture.
- Document hunting methodologies findings and lessons learned for continuous improvement.
- Stay ahead of evolving attack techniques and contribute to the development of new use cases and threat models.
Your ProfileEssential skills/knowledge/experience: - Extensiveexperience in cybersecurity with at least 2 years in threat hunting or advanced SOC operations.
- Expertise in hypothesis-driven threat hunting methodologies and proactive detection techniques.
- Hands-on experience with SIEM platforms (e.g. Microsoft Sentinel) including KQL queries custom detection rules and hunting queries.
- Strong knowledge of endpoint detection and response (EDR) tools network traffic analysis and log correlation.
- Familiarity with threat intelligence platforms IOCs TTPs and frameworks like MITRE ATT&CK.
- Ability to perform behavioural analysis anomaly detection and uncover stealthy attacker techniques.
- Advanced understanding of malware analysis forensic investigation and attack chain modelling.
- Competent in scripting and automation (PowerShell Python) to enhance hunting and detection capabilities.
- Broad technical knowledge of enterprise environments including cloud (Azure/AWS) networks and endpoints.
- Strong analytical problem-solving and communication skills to present findings to technical and non-technical audiences.
Desirable skills/knowledge/experience: - Microsoft Certified: Security Operations Analyst Associate
- Microsoft Certified: Azure Security Engineer Associate
- GIAC Certified Threat Hunter (GCTH)
- GIAC Certified Incident Handler (GCIH)
- GIAC Certified Forensic Analyst (GCFA)
- CompTIA CySA or Security
- Certified Information Systems Security Professional (CISSP)
- Certified Ethical Hacker (CEH)
Rewards & BenefitsTCS is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature pension health care life assurance laptop and access to extensive training resources and discounts within the larger Tata network.We offer health & wellness initiatives and sports events; we are the proud sponsor of the London Marathon and partner with our local communities in Ireland.Diversity Inclusion and WellbeingTata Consultancy Services UK&I is committed to meeting the accessibility needs of all individuals in accordance with the Ireland Employment Equality Acts 1998-2011 (as amended) and the Equal Status Acts 2000-2012 (as amended).We welcome and embrace diversity in race nationality ethnicity disability neurodiversity gender identity age physical ability gender reassignment sexual orientation. We are a disability inclusive employer and encourage disabled people to apply for this role.As a Disability Confident Employer we offer an interview to applicants with disabilities or long-term conditions who meet the minimum criteria for the role. Please email us at if you would like to opt in.If you are an applicant who needs any adjustments to the application process or interview please contact us atwith the subject line: Adjustment Request or email to request an adjustment. We welcome requests prior to you completing the application and at any stage of the recruitment process.Beware of Fraudulent offersThis is to notify you that TCS does not ask for any sort of payment or security deposit from candidates at any stage of the recruitment process. The firm never sends out job offers from free internet email services like Gmail Yahoo Mail and so on. TCS has not authorised any third-party company to collect money on their behalf. As a vigilant job seeker beware of fraudulent recruitment activity and protect your interests! You can write to to report any fraudulent activity.Due to the high volume of applications we will be unable to contact each applicant individually on the status of their application. If you have not received a direct response within 30 days then it should be deemed unsuccessful on this occasion.Join us and do more of what matters. Apply online now. Required Experience:
IC
If you need support in completing the application or if you require a different format of this document please get in touch with at with the subject line: Application Support Request.Role: SOC Analyst Threat HunterJob Type:PermanentLocation:Letterkenny OnsiteJoin a global tech leader right here in...
If you need support in completing the application or if you require a different format of this document please get in touch with at with the subject line: Application Support Request.Role: SOC Analyst Threat Hunter
Job Type:Permanent
Location:Letterkenny OnsiteJoin a global tech leader right here in Donegal. With over 850 employees and a state-of-the-art global delivery centre were proud to offer world-class career opportunities without having to leave the Northwest. Recognised as Workplace of the Year by the Letterkenny Chamber we foster a culture of continuous learning innovation and respect. Our people are at the heart of everything we do collaborating across teams geographies and disciplines to drive real change for clients around the world. Be part of something global grounded in Donegal.Careers at TCS: It means moreTCS is a purpose-led transformation company built on belief. We do not just help businesses to transform through technology. We support them in making a meaningful difference to the people and communities they serve - our clients include some of the biggest brands in the UK and worldwide. For you it means more to make an impact that matters through challenging projects which demand ambitious innovation and thought leadership.- Gain access to endlesslearning opportunities.
- Fast track your growth with diverse career opportunities internally.
- Grow your career while being exposed to new technologies.
The RoleAs a Threat Hunter your primary responsibility is to proactively identify and mitigate advanced threats that evade traditional security controls. You continuously search for indicators of compromise and malicious activity across networks endpoints and cloud environments. Using hypothesis-driven investigations you will analyse patterns anomalies and behaviours to uncover stealthy attackers and advanced persistent threats. You will leverage threat intelligence SIEM platforms and behavioural analytics to develop detection strategies and improve SOC capabilities. Collaborate with the incident response teams to validate findings and remediate threats effectively. You will create and refine hunting queries detection rules and automation playbooks to strengthen defences. Staying ahead of emerging attack techniques and integrating new intelligence into hunting methodologies. You will perform root cause analysis and provide actionable insights to enhance security posture. Your role drives continuous improvement by closing detection gaps and reducing dwell time.Your responsibilities:Key Responsibilities:- Proactively hunt for advanced threats APTs and indicators of compromise across networks endpoints and cloud environments.
- Develop and execute hypothesis-driven investigations to uncover stealthy attacks that evade traditional detection.
- Leverage SIEM platforms (e.g. Microsoft Sentinel) and threat intelligence feeds to identify anomalies and suspicious patterns.
- Create and refine detection rules queries and automation playbooks to improve SOC detection capabilities.
- Perform deep-dive analysis of logs network traffic and endpoint telemetry to identify malicious activity.
- Collaborate with incident response teams to validate findings and assist in remediation efforts.
- Integrate emerging threat intelligence into hunting strategies and detection mechanisms.
- Conduct root cause analysis and provide actionable recommendations to strengthen security posture.
- Document hunting methodologies findings and lessons learned for continuous improvement.
- Stay ahead of evolving attack techniques and contribute to the development of new use cases and threat models.
Your ProfileEssential skills/knowledge/experience: - Extensiveexperience in cybersecurity with at least 2 years in threat hunting or advanced SOC operations.
- Expertise in hypothesis-driven threat hunting methodologies and proactive detection techniques.
- Hands-on experience with SIEM platforms (e.g. Microsoft Sentinel) including KQL queries custom detection rules and hunting queries.
- Strong knowledge of endpoint detection and response (EDR) tools network traffic analysis and log correlation.
- Familiarity with threat intelligence platforms IOCs TTPs and frameworks like MITRE ATT&CK.
- Ability to perform behavioural analysis anomaly detection and uncover stealthy attacker techniques.
- Advanced understanding of malware analysis forensic investigation and attack chain modelling.
- Competent in scripting and automation (PowerShell Python) to enhance hunting and detection capabilities.
- Broad technical knowledge of enterprise environments including cloud (Azure/AWS) networks and endpoints.
- Strong analytical problem-solving and communication skills to present findings to technical and non-technical audiences.
Desirable skills/knowledge/experience: - Microsoft Certified: Security Operations Analyst Associate
- Microsoft Certified: Azure Security Engineer Associate
- GIAC Certified Threat Hunter (GCTH)
- GIAC Certified Incident Handler (GCIH)
- GIAC Certified Forensic Analyst (GCFA)
- CompTIA CySA or Security
- Certified Information Systems Security Professional (CISSP)
- Certified Ethical Hacker (CEH)
Rewards & BenefitsTCS is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature pension health care life assurance laptop and access to extensive training resources and discounts within the larger Tata network.We offer health & wellness initiatives and sports events; we are the proud sponsor of the London Marathon and partner with our local communities in Ireland.Diversity Inclusion and WellbeingTata Consultancy Services UK&I is committed to meeting the accessibility needs of all individuals in accordance with the Ireland Employment Equality Acts 1998-2011 (as amended) and the Equal Status Acts 2000-2012 (as amended).We welcome and embrace diversity in race nationality ethnicity disability neurodiversity gender identity age physical ability gender reassignment sexual orientation. We are a disability inclusive employer and encourage disabled people to apply for this role.As a Disability Confident Employer we offer an interview to applicants with disabilities or long-term conditions who meet the minimum criteria for the role. Please email us at if you would like to opt in.If you are an applicant who needs any adjustments to the application process or interview please contact us atwith the subject line: Adjustment Request or email to request an adjustment. We welcome requests prior to you completing the application and at any stage of the recruitment process.Beware of Fraudulent offersThis is to notify you that TCS does not ask for any sort of payment or security deposit from candidates at any stage of the recruitment process. The firm never sends out job offers from free internet email services like Gmail Yahoo Mail and so on. TCS has not authorised any third-party company to collect money on their behalf. As a vigilant job seeker beware of fraudulent recruitment activity and protect your interests! You can write to to report any fraudulent activity.Due to the high volume of applications we will be unable to contact each applicant individually on the status of their application. If you have not received a direct response within 30 days then it should be deemed unsuccessful on this occasion.Join us and do more of what matters. Apply online now. Required Experience:
IC
View more
View less