Company Overview
The ideal candidate will have a strong background in cybersecurity with a focus on advanced threat hunting. This individual will be skilled in translating strategic goals into practical, actionable plans. With deep expertise in the MITRE ATT&CK framework and in-depth experience working with large datasets and data lakes, this role requires someone with the ability to detect and respond to emerging threats at scale and deliver proactive, high-fidelity security measures.
This role will be responsible for threat hunting and tactical execution, data analysis and signal identification, vendor and product expertise, and operational strategy and reporting.
This is a full time, permanent position onsite in San Jose, CA.
Key Responsibilities
- Design and implement threat hunting frameworks using the MITRE ATT&CK framework, translating strategic objectives into effective tactical measures.
- Identify and operationalize threat hunting hypotheses to proactively uncover advanced threats and hidden risks.
- Establish repeatable processes to detect and mitigate evolving threats while minimizing noise and focusing on high-fidelity signals.
- Leverage experience working with data lakes to sift through and analyze large volumes of security data, identifying relevant signals and patterns that could indicate potential threats.
- Develop and maintain high-fidelity alerting mechanisms, utilizing data science techniques to enhance threat detection and response.
- Collaborate with data science teams, leveraging big data technologies to optimize the team’s ability to detect threats in real-time.
- Bring strong familiarity with EDR, XDR, and NDR technologies from various leading security vendors, understanding both their strengths and limitations.
- Evaluate and recommend technology and process improvements based on deep industry knowledge, tailoring detection strategies based on vendor capabilities and customer needs.
- Ensure the MDR team is equipped and trained on the latest tools and methodologies to provide comprehensive, vendor-agnostic threat coverage.
- Work with executive leadership to translate organizational security strategy into effective MDR operational plans.
- Define, track, and report on key performance indicators (KPIs) and metrics related to team performance, incident detection, response efficiency, and threat hunting efficacy.
- Act as the escalation point for critical incidents, ensuring timely and comprehensive response and root cause analysis.
- Coordinate team operations to meet service level agreements (SLAs) and ensure rapid, effective response to security incidents.
- Foster a culture of continuous learning and improvement within the team, staying up-to-date on the latest threat intelligence and detection methodologies.
Qualifications
- Bachelor’s degree in Computer Science, Cybersecurity, Information Systems, or a related field; advanced degree preferred.
- 7+ years of experience in cybersecurity, with at least 3 years managing advanced threat hunting capabilities.
- Hands-on experience with MITRE ATT&CK, data lakes, and working with massive data volumes for threat detection.
- Strong familiarity with EDR, XDR, and NDR products, with experience working across various security vendor solutions.
- Previous experience working for a cybersecurity vendor, ideally within an MDR, SOC, or threat intelligence service.
- Ability to balance strategic oversight with hands-on tactical execution, translating high-level security objectives into actionable tasks.
- Excellent communication and collaboration skills, with an ability to present complex security concepts to both technical and non-technical stakeholders.
APPLY