Join a cutting-edge cybersecurity startup at the forefront of innovation! We're tackling the growing challenge of overwhelming security alerts with a novel, AI-powered approach. Imagine being part of a team that's reducing threat investigation and response times by over 90%, empowering organizations to proactively defend against sophisticated cyberattacks.
If you're a driven and experienced Threat Hunter eager to shape the future of cyber defense and build something truly impactful from the ground up, we want to hear from you.
Key Responsibilities:
● Develop high-fidelity, AI-ready detection templates to build detection rules in Sigma, KQL, SPL, Lucene, etc., for Microsoft Sentinel, Chronicle, Splunk, and Elastic.
● Leverage AI-powered engines to prioritize, cluster, and tune detection content dynamically based on environment behavior and telemetry changes.
● Identify visibility and data coverage gaps across cloud, identity, EDR, and SaaS log sources; work cross-functionally to close them.
● Lead proactive threat hunts driven by AI-assisted hypotheses, anomaly detection.
● known threat actor TTPs.
● Contribute to AI-enhanced detection-as-code pipelines, integrating rules into CI/CD workflows and feedback loops.
● Collaborate with SOC, threat intel, and AI/data science teams to continuously evolve detection efficacy and reduce alert fatigue.
● Participate in adversary emulation, purple teaming, and post-incident reviews to drive continuous improvement.
Required Skills:
● 5+ years of hands-on experience in detection engineering, threat hunting, or security operations. ● Expert-level knowledge of at least two major SIEM platforms: Microsoft Sentinel, Google Chronicle, Splunk, Elastic, or similar.
● Strong proficiency in detection rule languages (Sigma, KQL, SPL, Lucene) and mapping to MITRE ATT&CK.
● Experience using or integrating AI/ML for detection enrichment, alert correlation, or anomaly-based hunting.
● Familiarity with telemetry sources (EDR, cloud, identity, DNS, proxy) and techniques to enrich or normalize them.
● Ability to document, test, and optimize detection rules and threat hunt queries in a modular, scalable fashion.
● Strong communication skills and the ability to translate complex threat scenarios into automated, AI-ready detection logic. Nice to Have
● Experience integrating AI/ML platforms for security analytics, behavior baselining, or entity risk scoring.
● Familiarity with detection-as-code and GitOps workflows for rule development, testing, and deployment.
● Scripting knowledge (Python, PowerShell) for enrichment, custom detection logic, or automation. ● Experience with purple teaming tools like Atomic Red Team, SCYTHE, or Caldera.
If you're ready to shape technical strategy and solve real-world Cyber Security problems at scale, we want to hear from you.
We are building the future of next evolution of AI-powered cyber defense. Join us!