Job Description
Title: Threat Hunting Associate
Location: Gurgaon
Exp: 5-8 yrs
Job Description:
Primary Skills
Threat Hunting, Malware Analysis, EDR, Reverse Eng.
Key Responsibilities:
- =
Conduct proactive threat hunting across endpoints, networks, and cloud environments using SIEM, EDR, and threat intelligence platforms
- > Analyze behavioral patterns, anomalies, and indicators of compromise (IOCs) to uncover hidden threats
- = Collaborate with SOC, incident response, and threat intelligence teams to validate findings and escalate incidents
- > Develop and refine hypotheses based on MITRE Telecommunication&CK framework and threat actor TTPs
- = Create detailed reports and dashboards to communicate threat findings and hunting outcomes
- = Build and maintain hunting playbooks, detection rules, and custom queries (e.g., KQL, Sigma, YARA)
- = Continuously improve threat hunting methodologies and contribute to detection engineering efforts
- = Stay current with emerging threats, vulnerabilities, and adversary techniques
Required Skills & Qualifications:
- 5–8 years of experience in cybersecurity, with at least 2 years in threat hunting or detection engineering
- Proficiency with SIEM tools (e.g., Splunk, Sentinel, QRadar), EDR platforms (e.g., CrowdStrike, Carbon Black), and threat Client feeds
- Strong understanding of Windows, Linux, and cloud (AWS/Azure) telemetry and log sources
- Familiarity with MITRE Telecommunication&CK, Cyber Kill Chain, and threat modeling concepts
- Experience with scripting/query languages (Python, PowerShell, KQL, SQL)
- Excellent analytical, documentation, and communication skills
Preferred Qualifications:
- < Certifications such as GCTI, GCFA, GNFA, CEH, or equivalent
- < Experience with threat emulation tools (e.g., Caldera, Atomic Red Team)
- < Exposure to cloud-native security tools and XDR platforms
- < Background in malware analysis or reverse engineering (a plus)
Location: Gurgaon
Exp: 5-8 yrs
Job Description:
Primary Skills
Threat Hunting, Malware Analysis, EDR, Reverse Eng.
Key Responsibilities:
- =
Conduct proactive threat hunting across endpoints, networks, and cloud environments using SIEM, EDR, and threat intelligence platforms
- > Analyze behavioral patterns, anomalies, and indicators of compromise (IOCs) to uncover hidden threats
- = Collaborate with SOC, incident response, and threat intelligence teams to validate findings and escalate incidents
- > Develop and refine hypotheses based on MITRE Telecommunication&CK framework and threat actor TTPs
- = Create detailed reports and dashboards to communicate threat findings and hunting outcomes
- = Build and maintain hunting playbooks, detection rules, and custom queries (e.g., KQL, Sigma, YARA)
- = Continuously improve threat hunting methodologies and contribute to detection engineering efforts
- = Stay current with emerging threats, vulnerabilities, and adversary techniques
Required Skills & Qualifications:
- 5–8 years of experience in cybersecurity, with at least 2 years in threat hunting or detection engineering
- Proficiency with SIEM tools (e.g., Splunk, Sentinel, QRadar), EDR platforms (e.g., CrowdStrike, Carbon Black), and threat Client feeds
- Strong understanding of Windows, Linux, and cloud (AWS/Azure) telemetry and log sources
- Familiarity with MITRE Telecommunication&CK, Cyber Kill Chain, and threat modeling concepts
- Experience with scripting/query languages (Python, PowerShell, KQL, SQL)
- Excellent analytical, documentation, and communication skills
Preferred Qualifications:
- < Certifications such as GCTI, GCFA, GNFA, CEH, or equivalent
- < Experience with threat emulation tools (e.g., Caldera, Atomic Red Team)
- < Exposure to cloud-native security tools and XDR platforms
- < Background in malware analysis or reverse engineering (a plus)
Apply for this Position
Ready to join ? Click the button below to submit your application.
Submit Application