1-2 days onsite in their Seattle office.
Security Analyst - Threat Hunter
This role focuses on proactive defense through hypothesis-based investigations across enterprise telemetry. The ideal candidate moves beyond alert-monitoring to uncover low-signal malicious activity and translate findings into hardened security postures.
Core Responsibilities
- Proactive Threat Hunting: Conduct data-driven hunts across endpoint identity network and cloud (AWS/Azure) environments to identify adversary behaviors.
- Intel Operationalization: Consume threat intelligence to develop hunt hypotheses and validate findings through deep-dive data analysis rather than static alerts.
- Detection Engineering: Identify gaps in existing security coverage and align new detection logic with the MITRE ATT&CK framework.
- Tooling Mastery: Query and analyze large datasets using KQL Microsoft Sentinel and Microsoft Defender.
- Reporting & Strategy: Document methodologies and outcomes to communicate risk to stakeholders and refine incident response playbooks.
Key Qualifications
- Experience: 8 years in SOC Incident Response or Threat Hunting.
- Technical Skills: Deep familiarity with EDR/SIEM telemetry cloud security and complex event investigation.
- Soft Skills: Strong ability to collaborate across functions and influence defensive improvements without direct authority.
1-2 days onsite in their Seattle office. Security Analyst - Threat Hunter This role focuses on proactive defense through hypothesis-based investigations across enterprise telemetry. The ideal candidate moves beyond alert-monitoring to uncover low-signal malicious activity and translate finding...
1-2 days onsite in their Seattle office.
Security Analyst - Threat Hunter
This role focuses on proactive defense through hypothesis-based investigations across enterprise telemetry. The ideal candidate moves beyond alert-monitoring to uncover low-signal malicious activity and translate findings into hardened security postures.
Core Responsibilities
- Proactive Threat Hunting: Conduct data-driven hunts across endpoint identity network and cloud (AWS/Azure) environments to identify adversary behaviors.
- Intel Operationalization: Consume threat intelligence to develop hunt hypotheses and validate findings through deep-dive data analysis rather than static alerts.
- Detection Engineering: Identify gaps in existing security coverage and align new detection logic with the MITRE ATT&CK framework.
- Tooling Mastery: Query and analyze large datasets using KQL Microsoft Sentinel and Microsoft Defender.
- Reporting & Strategy: Document methodologies and outcomes to communicate risk to stakeholders and refine incident response playbooks.
Key Qualifications
- Experience: 8 years in SOC Incident Response or Threat Hunting.
- Technical Skills: Deep familiarity with EDR/SIEM telemetry cloud security and complex event investigation.
- Soft Skills: Strong ability to collaborate across functions and influence defensive improvements without direct authority.
View more
View less