Submitting more applications increases your chances of landing a job.
Here’s how busy the average job seeker was last month:
Opportunities viewed
Applications submitted
Keep exploring and applying to maximize your chances!
Looking for employers with a proven track record of hiring women?
Click here to explore opportunities now!You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for
Would You Be Likely to Participate?
If selected, we will contact you via email with further instructions and details about your participation.
You will receive a $7 payout for answering the survey.
About Company:
Our client is a trusted data center company providing end-to-end infrastructure solutions across India and international markets, known for reliability, scalability, and strong engineering expertise.
An Ideal Candidate:
An Ideal candidate should be 3+ years of experience working as a Threat Hunter L2, responsible for proactive threat detection, investigation, and mitigation, collaborating closely with SOC and IT teams while conducting continuous threat hunting and delivering actionable security insights through periodic reporting
Key Competencies:
Job Description -
· 3–5 years of experience in Threat Hunting/SOC/IR with hands-on expertise in SIEM (LogRhythm, QRadar) and EDR/XDR tools (SentinelOne, CrowdStrike).
· Perform proactive threat hunting across endpoint, network, cloud, and identity logs to detect advanced and stealthy threats.
· Develop and execute hunt hypotheses using attacker TTPs, threat intelligence, and MITRE ATT&CK framework.
· Investigate and correlate security events across SIEM, EDR/XDR, NDR, firewall, and Active Directory logs.
· Convert hunt findings into actionable detection rules and optimize SIEM queries to reduce false positives.
· Handle medium-to-complex L2 incident investigations, including lateral movement and persistence analysis.
· Conduct IOC/TTP mapping, enrichment, and validation, collaborating with SOC, DFIR, and Threat Intelligence teams.
· Possess strong knowledge of Windows/Linux internals, AD logs, network protocols (DNS, HTTP, SMB, RDP), MITRE mapping, Sigma/YARA rules, basic scripting, and strong analytical and documentation skills.
You'll no longer be considered for this role and your application will be removed from the employer's inbox.