Submitting more applications increases your chances of landing a job.

Here’s how busy the average job seeker was last month:

Opportunities viewed

Applications submitted

Keep exploring and applying to maximize your chances!

Looking for employers with a proven track record of hiring women?

Click here to explore opportunities now!
We Value Your Feedback

You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for

Would You Be Likely to Participate?

If selected, we will contact you via email with further instructions and details about your participation.

You will receive a $7 payout for answering the survey.


User unblocked successfully
https://bayt.page.link/TCXUVwxVvo4kBpTy9
Back to the job results

Threat Hunting L2

30+ days ago 2026/07/13
Other Business Support Services
Create a job alert for similar positions
Job alert turned off. You won’t receive updates for this search anymore.

Job description

About Company:



Our client is a trusted data center company providing end-to-end infrastructure solutions across India and international markets, known for reliability, scalability, and strong engineering expertise.



An Ideal Candidate:



An Ideal candidate should be 3+ years of experience working as a Threat Hunter L2, responsible for proactive threat detection, investigation, and mitigation, collaborating closely with SOC and IT teams while conducting continuous threat hunting and delivering actionable security insights through periodic reporting



Key Competencies:



Job Description -



· 3–5 years of experience in Threat Hunting/SOC/IR with hands-on expertise in SIEM (LogRhythm, QRadar) and EDR/XDR tools (SentinelOne, CrowdStrike).



· Perform proactive threat hunting across endpoint, network, cloud, and identity logs to detect advanced and stealthy threats.



· Develop and execute hunt hypotheses using attacker TTPs, threat intelligence, and MITRE ATT&CK framework.



· Investigate and correlate security events across SIEM, EDR/XDR, NDR, firewall, and Active Directory logs.



· Convert hunt findings into actionable detection rules and optimize SIEM queries to reduce false positives.



· Handle medium-to-complex L2 incident investigations, including lateral movement and persistence analysis.



· Conduct IOC/TTP mapping, enrichment, and validation, collaborating with SOC, DFIR, and Threat Intelligence teams.



· Possess strong knowledge of Windows/Linux internals, AD logs, network protocols (DNS, HTTP, SMB, RDP), MITRE mapping, Sigma/YARA rules, basic scripting, and strong analytical and documentation skills.




This job post has been translated by AI and may contain minor differences or errors.

You’ve reached the maximum limit of 15 job alerts. To create a new alert, please delete an existing one first.
Job alert created for this search. You’ll receive updates when new jobs match.
Are you sure you want to unapply?

You'll no longer be considered for this role and your application will be removed from the employer's inbox.