Threat Hunter / Security Analyst

Job Category: IT and Technology
Job Type: Full Time
Job Location: USA
Company Name: Galvanick

Company Overview

Galvanick specializes in safeguarding industrial operations from cyber threats. Our advanced threat detection platform is specifically designed to protect factories and critical infrastructure by defending SCADA (Supervisory Control and Data Acquisition) and ICS (Industrial Control Systems) against attacks from criminals and nation-states.

Threat Hunter / SOC Analyst at Galvanick (Seattle – Onsite with Relocation Assistance)

About Galvanick:

Galvanick is a cybersecurity startup protecting the industrial world from cyber attacks targeting SCADA and ICS. Join our driven team of experts from top tech companies, government, and finance to solve critical security challenges in a dynamic environment. We are backed by leading venture capital firms.

About the Role:

As a Threat Hunter / SOC Analyst, you will be crucial in enhancing our operational security by proactively hunting for threats within customer systems and networks. You will leverage Galvanick’s unique data to identify potential security breaches, ensure our threat hunting capabilities scale, and provide valuable insights through monthly reports with findings and recommendations.

What You Will Do:

  • Proactively hunt for threats within customer systems and networks using telemetry data from applications, infrastructure, and endpoints.
  • Monitor and analyze security events to identify potential threats.
  • Leverage your in-depth knowledge of security tools, techniques, methodologies, and threat intelligence platforms.
  • Apply strong analytical and problem-solving skills to identify potential threats strategically.
  • Utilize your excellent understanding of attack vectors, vulnerabilities, and common security weaknesses.
  • Produce clear and concise monthly reports summarizing findings and providing high-level recommendations for both technical and non-technical stakeholders.

Who You Are:

  • Possess 5+ years of experience in Incident Response, Security Operations, Threat Hunting, and/or Cyber Threat Intelligence.
  • Have experience monitoring and analyzing telemetry data from applications, infrastructure, and endpoints.
  • Demonstrate in-depth knowledge of security tools, techniques, and methodologies, with familiarity with threat intelligence platforms and frameworks.
  • Exhibit strong analytical and problem-solving skills with strategic thinking abilities.
  • Have an excellent understanding of attack vectors, vulnerabilities, and common security weaknesses.
  • Possess proven experience as a SOC analyst or threat hunter with a strong operational security background.
  • Communicate effectively, conveying complex security concepts clearly to both technical and non-technical audiences, including experience writing monthly reports.

Bonus Points:

  • Experience conducting threat hunting or managing incident response against advanced threats.
  • Knowledge of cyber threat intelligence terminology and data communication concepts.
  • A natural curiosity for problem-solving and the technologies you use.
  • Startup experience and a passion for tackling complex, novel problems.
  • Experience with industrial, operational, or fulfillment environments.
  • Relevant certifications (CISSP, CEH, GCIH).

Benefits:

We offer top-tier medical, dental, and vision coverage for employees and dependents, along with additional wellness benefits.

Compensation:

The base pay range for this role is $100,000 – $180,000 annually, depending on location and experience. As an early-stage startup, our compensation package also includes potential equity.

Location:

This is an onsite position based in our Seattle office. We are happy to cover relocation expenses.

ITAR Requirements:

Due to US Government export regulations, you must be a US citizen, lawful permanent resident, protected individual, or eligible to obtain required authorizations.

Apply for this position

Allowed Type(s): .pdf, .doc, .docx