Threat Hunter - Cyber Fusion
United States
Cyderes
Cyderes offers tech-enabled managed security services for real-time risk and compliance management in modern enterprises.About the Role:We are seeking a skilled and motivated Threat Hunter to proactively detect and respond to advanced threats thatevade traditional security defenses. The ideal candidate thrivesin a dynamic environment and is passionate about cybersecurity, curious about adversarial behavior, and driven to improve organizational resilience. This role requires the ability to differentiate high-fidelity from low-fidelity data, craft innovative detection queries, and engage cross-functionally with internal and customer-facing teams.
Responsibilities:
- Conduct proactive, hypothesis-driven hunts across customer environments to detect and isolate advanced threats.
- Evaluate and distinguish between high and low-fidelity alerts, logs, and results to ensure efficient triage and accurate threat identification.
- Design and execute innovative queries and detection logic based on behavioral analysis, threat intelligence, and adversary tactics (MITRE ATT&CK, Cyber Kill Chain, etc.).
- Vet and validate indicators of compromise (IOCs) for fidelity and inclusion in the Threat Intelligence Platform (TIP).
- Coordinate the dissemination of vetted intelligence and threat information to appropriate internal teams and customer stakeholders.
- Lead and/or contribute to regular customer meetings and deliver tailored threat insights and hunting reports.
- Enhance customer risk profiles through customized reviews and provide actionable recommendations for security posture improvements.
- Perform targeted insider threat and risk-based hunting activities, identifying gaps in detection and response capabilities.
- Maintain deep situational awareness of evolving threats, tools, and adversarial TTPs.
Requirements:
- 3+ years of experience in threat hunting, incident response, or cybersecurity operations (SOC).
- Proven ability to analyze security data and logs to uncover malicious activity.
- Experience with host and network telemetry tools (EDR, SIEM, IDS/IPS, etc.).
- Strong knowledge of network and endpoint protocols, including HTTP/S, DNS, FTP, SMTP, Active Directory, etc.
- Deep understanding of malware types, delivery mechanisms, and attacker behaviors.
- Familiarity with threat frameworks such as MITRE ATT&CK and Cyber Kill Chain.
- Demonstrated experience creating and refining detection content and threat queries.
- Strong analytical, problem-solving, and communication skills.
- Bachelor’s degree in a related field or equivalent practical experience.
- Desired Skills & Certifications - Experience with scripting and automation (e.g., Python, PowerShell, Bash, Perl).
- Industry certifications: CISSP, GCIH, GCIA, GPEN, CEH, or equivalent.
- Hands-on experience with TIPs, EDR platforms, and SIEM technologies.
- Active involvement in cybersecurity research or threat intelligence communities.
- Familiarity with insider threat detection models and risk-based hunting strategies.
Note: This job posting is intended for direct applicants only. We request that outside recruiters do not contact us regarding this position.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory Automation Bash CEH CISSP Cyber defense Cyber Kill Chain DNS EDR GCIA GCIH GPEN IAM IDS Incident response IPS Malware MITRE ATT&CK Perl PowerShell Python Scripting SIEM SMTP SOC Threat detection Threat intelligence TTPs
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.