Security Researcher
Tel Aviv-Yafo, Tel Aviv District, IL
Hunters
AI-Driven, Next-Gen SIEM that helps SOC teams do more with less. This AI-native SOC Platform automates manual tasks to help you focus on alerts that matter.Description
Hunters Next-Gen SIEM helps small security teams be more effective and efficient by automating the entire threat detection, investigation, and response process. Hunters deploys in days and eliminates repetitive work with out-of-the-box integrations and detection rules. High priority alerts are surfaced based on risk and confidence scoring, and similar alerts are clustered together, reducing alert triage by 80%. Customers can build an open, scalable data lake at a predictable cost, and bring their own data lake or leverage Hunters’. Team Axon provides rapid response to emerging threats, incident investigation, proactive threat hunting, and security posture and hygiene reporting.
Hunters was recognized as a Leader in the 2024 GigaOm Radar for SIEM and received an Honorable Mention in the 2024 Gartner Magic Quadrant for SIEM. Learn how companies like Booking.com, Synthesia, TheRealReal and Cimpress are leveraging Hunters to empower their security teams at https://www.hunters.security.
We are looking for a top-notch Security Researcher, to resolve the toughest issue in cybersecurity: utilizing terabytes of data for detecting attacks, incident investigation and prioritizing threats.
Responsibilities
- Threat Analysis and Research: Dive deep into terabytes of data to identify new attack vectors, emerging threats, and vulnerabilities across various attack surfaces. Stay up-to-date with the latest cybersecurity trends and contribute to the development of cutting-edge threat detection methodologies.
- Incident Investigation: Utilize your technical prowess to investigate complex security incidents, analyzing data from diverse sources to uncover the root causes and methods of attack. Collaborate with incident response teams to develop effective strategies for containment and mitigation.
- False Positive Reduction: Leverage your expertise in data analysis and correlation to fine-tune detection rules and algorithms, minimizing false positives and enhancing the accuracy of our platform's threat alerts.
- Thought Leadership and Community Engagement: Drive thought leadership initiatives by creating technical blog posts, delivering webinars, and speaking at conferences to share insights, educate the community, and enhance the company's reputation in the cybersecurity landscape.
- Be at the forefront of the Hunters mission and work closely with Hunters customers regarding cyber security investigations and incidents detected in their environments
Requirements
- A background of at least 5 years in defensive and/or offensive Cyber Security:
- Red Teaming / Penetration Testing or Malware analysis experience
- Blue Teaming / Threat Hunting experience
- Solid understanding of various enterprise technologies, such as:
- OS internals, EDR
- Active Directory, Office 365
- Cloud technologies such as AWS, Microsoft Azure and GCP
- Network protocols and security products
- Identity & SSO products such as Okta, Auth0 and OneLogin
- Kubernetes
- Experience with Python, SQL or similar data analysis capabilities
- Proficient in English (both written and spoken)
Our Core Values:
- Yalla! Let’s Do It!- Get “s**t done" attitude. When we face a challenge, we pursue it headfirst, while keeping our strategic goals in mind.
- We Gotcha Covered- Customers are the most important part of our ecosystem. Our success is tied to their success. This is why we think about their best interest in every decision we make. Our job is to strike the right balance between listening and guiding to build a foundation for true partnership with our clients.
- Evolve!- As a company we evolve, change, learn, and adapt. What we did yesterday is not necessarily the best approach for tomorrow. We adhere to an ongoing effort to improve products, services, or processes. These efforts can seek ’incremental’ improvement over time or ’breakthrough’ improvement all at once. Processes are constantly evaluated and improved in light of their efficiency, effectiveness, and flexibility.
- Put everything on the table- The key to successful teams is transparency, honesty, and vulnerability. Respectfully and empathetically, we will dare to share our thoughts, feelings, opinions, and ideas.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory AWS Azure Cloud EDR GCP Incident response Kubernetes Malware Okta Pentesting Python Red team SIEM SQL SSO Threat detection Vulnerabilities
Perks/benefits: Conferences
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.