Post Job Free
Sign in

Cyber Security Analyst - Threat Hunter

Company:
CareerXperts Consulting
Location:
India, PA
Posted:
May 21, 2025
Apply

Description:

Join a cutting-edge cybersecurity startup at the forefront of innovation! We're tackling the growing challenge of overwhelming security alerts with a novel, AI-powered approach. Imagine being part of a team that's reducing threat investigation and response times by over 90%, empowering organizations to proactively defend against sophisticated cyberattacks.

If you're a driven and experienced Threat Hunter eager to shape the future of cyber defense and build something truly impactful from the ground up, we want to hear from you.

Key Responsibilities:

● Develop high-fidelity, AI-ready detection templates to build detection rules in Sigma, KQL, SPL, Lucene, etc., for Microsoft Sentinel, Chronicle, Splunk, and Elastic.

● Leverage AI-powered engines to prioritize, cluster, and tune detection content dynamically based on environment behavior and telemetry changes.

● Identify visibility and data coverage gaps across cloud, identity, EDR, and SaaS log sources; work cross-functionally to close them.

● Lead proactive threat hunts driven by AI-assisted hypotheses, anomaly detection.

● known threat actor TTPs.

● Contribute to AI-enhanced detection-as-code pipelines, integrating rules into CI/CD workflows and feedback loops.

● Collaborate with SOC, threat intel, and AI/data science teams to continuously evolve detection efficacy and reduce alert fatigue.

● Participate in adversary emulation, purple teaming, and post-incident reviews to drive continuous improvement.

Required Skills:

● 5+ years of hands-on experience in detection engineering, threat hunting, or security operations. ● Expert-level knowledge of at least two major SIEM platforms: Microsoft Sentinel, Google Chronicle, Splunk, Elastic, or similar.

● Strong proficiency in detection rule languages (Sigma, KQL, SPL, Lucene) and mapping to MITRE ATT&CK.

● Experience using or integrating AI/ML for detection enrichment, alert correlation, or anomaly-based hunting.

● Familiarity with telemetry sources (EDR, cloud, identity, DNS, proxy) and techniques to enrich or normalize them.

● Ability to document, test, and optimize detection rules and threat hunt queries in a modular, scalable fashion.

● Strong communication skills and the ability to translate complex threat scenarios into automated, AI-ready detection logic. Nice to Have

● Experience integrating AI/ML platforms for security analytics, behavior baselining, or entity risk scoring.

● Familiarity with detection-as-code and GitOps workflows for rule development, testing, and deployment.

● Scripting knowledge (Python, PowerShell) for enrichment, custom detection logic, or automation. ● Experience with purple teaming tools like Atomic Red Team, SCYTHE, or Caldera.

If you're ready to shape technical strategy and solve real-world Cyber Security problems at scale, we want to hear from you.

We are building the future of next evolution of AI-powered cyber defense. Join us!

Apply