?i,? Collaborate with SOC, incident response, and threat intelligence teams to validate findings and escalate incidents ?Y?? Develop and refine hypotheses based on MITRE Telecommunication&CK framework and threat actor TTPs ?Y"S Create detailed reports and dashboards to communicate threat findings and hunting outcomes ?Y> i,?…"> ?i,? Collaborate with SOC, incident response, and threat intelligence teams to validate findings and escalate incidents ?Y?? Develop and refine hypotheses based on MITRE Telecommunication&CK framework and threat actor TTPs ?Y"S Create detailed reports and dashboards to communicate threat findings and hunting outcomes ?Y> i,?…" />
Title: Threat Hunting Associate
Location: Gurgaon
Exp: 5-8 yrs
:
Primary Skills
Threat Hunting, Malware Analysis, EDR, Reverse Eng.
Key Responsibilities:
- ?Y"? Conduct proactive threat hunting across endpoints, networks, and cloud environments using SIEM, EDR, and threat intelligence platforms
- ?Y Analyze behavioral patterns, anomalies, and indicators of compromise (IOCs) to uncover hidden threats
- ?Y>i? Collaborate with SOC, incident response, and threat intelligence teams to validate findings and escalate incidents
- ?Y Develop and refine hypotheses based on MITRE Telecommunication&CK framework and threat actor TTPs
- ?Y"S Create detailed reports and dashboards to communicate threat findings and hunting outcomes
- ?Y> i? Build and maintain hunting playbooks, detection rules, and custom queries (e.g., KQL, Sigma, YARA)
- ?Y",, Continuously improve threat hunting methodologies and contribute to detection engineering efforts
- ?Y"s Stay current with emerging threats, vulnerabilities, and adversary techniques
Required Skills & Qualifications:
- aoe... 5-8 years of experience in cybersecurity, with at least 2 years in threat hunting or detection engineering
- aoe... Proficiency with SIEM tools (e.g., Splunk, Sentinel, QRadar), EDR platforms (e.g., CrowdStrike, Carbon Black), and threat Client feeds
- aoe... Strong understanding of Windows, Linux, and cloud (AWS/Azure) telemetry and log sources
- aoe... Familiarity with MITRE Telecommunication&CK, Cyber Kill Chain, and threat modeling concepts
- aoe... Experience with scripting/query languages (Python, PowerShell, KQL, SQL)
- aoe... Excellent analytical, documentation, and communication skills
Preferred Qualifications:
- ?YOEY Certifications such as GCTI, GCFA, GNFA, CEH, or equivalent
- ?YOEY Experience with threat emulation tools (e.g., Caldera, Atomic Red Team)
- ?YOEY Exposure to cloud-native security tools and XDR platforms
- ?YOEY Background in malware analysis or reverse engineering (a plus)
MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.