VP, Cyber Hunt Leader

Charlotte Remote NC

Synchrony

Find great deals, promotional offers, credit cards, savings products, payment solutions, and more. See how Synchrony can help you today!

View all jobs at Synchrony

Apply now Apply later

Job Description:

Role Summary/Purpose:

The VP, Cyber Hunt Leader is part of the Synchrony Joint Security Operations Center (JSOC) leadership team.  This position is responsible for identifying and leading the implementation of key initiatives that aim to enhance and mature the Synchrony threat hunt capabilities.  Through collaboration with JSOC leaders, Technical Cyber Intelligence, and other cross-functional teams, this individual will execute enterprise-wide threat hunt operations to uncover sophisticated and undetected threats.  The ideal candidate will be an inquisitive and curious critical thinker demonstrating significant domain expertise across three or more security domains including threat intelligence, threat hunting, incident response, digital forensics, cloud security, security engineering, security operations, endpoint security or offensive security. 

We’re proud to offer you choice and flexibility. At Synchrony, our way of working allows you to have the option to work from home, near one of our Hubs or come into one of our offices. Occasionally you may be required to commute to our nearest office for in person engagement activities such as business or team meetings, training and culture events.

Essential Responsibilities:

  • Lead a team of cyber threat hunters in designing and executing complex, intelligence-driven, hypothesis-based threat hunts, overseeing all phases from hypothesis drafting through final documentation and closure.

  • Benchmark and implement industry best practices for threat hunting and cybersecurity operations, such as MITRE ATT&CK and NIST Cybersecurity Framework (CSF).

  • Regularly identify, research, and analyze emerging attack techniques to develop tailored hunt content to support proactive detection efforts.

  • Demonstrate advanced proficiency in utilizing EDR products for threat detection, investigation, and response, leveraging their capabilities to analyze endpoint activity, identify anomalies, and facilitate timely remediation of security incidents.

  • Serve as the technical SME for high-impact detection and response initiatives, driving rapid enhancement of controls to address complex, priority threats effectively.

  • Provide technical leadership and expertise to enhance proactive threat detection capabilities, delivering recommendations that strengthen the organization’s overall security posture.

  • Coordinate with multidisciplinary teams across intel, detection, engineering and technology to iteratively improve security controls and detection capabilities.

  • Collaborate with the incident response team during declared incidents, providing expert threat-hunting support to identify, analyze, and mitigate security threats while assisting in post-incident reviews and remediation efforts.

  • Oversee and maintain the cyber lab environment to ensure it remains fully equipped and optimized for threat-hunting tests, control validation, and security tool evaluation.

  • Excellent communicator skilled at translating complex technical concepts into clear, actionable insights, effectively articulating risk and hunt strategies to senior leadership and non-technical stakeholders

  • Advise management on the selection and evaluation of vendors and security technologies, collaborating with suppliers to ensure optimal tool alignment, configuration, and security posture

  • Mentor and develop junior team members across cyber operations through coaching, collaboration and leadership.

  • Interface with industry peers to acquire and share Cyber Hunt best-practices in the sector.

  • Perform other duties and/or special projects as assigned.

Qualifications/Requirements:

  • Bachelor Degree in computer science or a related discipline and a minimum of 7 years of cyber security experience with at least 5 years focused on Threat Hunting, Incident Response, or Detection Engineering or equivalent work experience in information systems or intelligence required OR, in lieu of a degree, a high school diploma / GED and a minimum of 10 years of cyber security experience with at least 5 years focused on Threat Hunting, Incident Response, or Detection Engineering.

  • Expert level abilities to collect and analyze host-based artifacts across major operating systems including Windows, Linux, and MacOS.

  • In-depth attack surface knowledge of one or more major cloud providers (AWS, Azure, GCP).

  • Proficiency in using python or other similar scripting language to interact with APIs or manipulate large datasets for analysis.

  • One or more relevant security certifications (GCIH, GCIA, GCFE, GCFA, SANS, AWS Certified Cloud Practitioner, AWS Certified Security Specialty, or comparable).

Desired Characteristics: 

  • Experience and familiarity with analytic standards and tradecraft

  • Experience in the financial services sector

  • Strong oral and written communications skills

  • Strong analytical & critical thinking capabilities

  • Expertise to clearly define complex issues despite incomplete or ambiguous information

Grade/Level: 13

                                                                                  

The salary range for this position is 150,000.00 - 250,000.00 USD Annual and is eligible for an annual bonus based on individual and company performance.

                               

Actual compensation offered within the posted salary range will be based upon work experience, skill level or knowledge.

Salaries are adjusted according to market in CA, NY Metro and Seattle.

Eligibility Requirements:

  • You must be 18 years or older

  • You must have a high school diploma or equivalent

  • You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process

  • You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act.

  • New hires (Level 4-7) must have 9 months of continuous service with the company before they are eligible to post on other roles.  Once this new hire time in position requirement is met, the associate will have a minimum 6 months’ time in position before they can post for future non-exempt roles.  Employees, level 8 or greater, must have at least 18 months’ time in position before they can post.  All internal employees must consistently meet performance expectations and have approval from your manager to post (or the approval of your manager and HR if you don’t meet the time in position or performance expectations).

Legal authorization to work in the U.S. is required.  We will not sponsor individuals for employment visas, now or in the future, for this job opening. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. 

Our Commitment:

When you join us, you’ll be part of a diverse, inclusive culture where your skills, experience, and voice are not only heard—but valued. We celebrate the differences in all of us and believe that our individual, unique perspectives is what makes Synchrony truly a great place to work. Together, we’re building a future where we can all belong, connect and turn ideals into action. Through the power of our 8 Diversity Networks+, with more than 60% of our workforce engaged, you’ll find community to connect with an opportunity to go beyond your passions.

This starts when you choose to apply for a role at Synchrony. We ensure all qualified applicants will receive consideration for employment without regard to age, race, color, religion, gender, sexual orientation, gender identity, national origin, disability, or veteran status.

Reasonable Accommodation Notice:

  • Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment.

  • If you need special accommodations, please call our Career Support Line so that we can discuss your specific situation. We can be reached at 1-866-301-5627.   Representatives are available from 8am – 5pm Monday to Friday, Central Standard Time

Job Family Group:

Information Technology

Apply now Apply later
Job stats:  9  1  0
Category: Leadership Jobs

Tags: APIs AWS Azure Cloud Computer Science EDR Endpoint security Forensics GCFA GCFE GCIA GCIH GCP Incident response Linux MacOS MITRE ATT&CK NIST Offensive security Python SANS Scripting SOC Threat detection Threat intelligence Windows

Perks/benefits: Gear Insurance Salary bonus Signing bonus Team events

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.