Match score not available

Threat Hunter Analyst

Remote: 
Full Remote
Work from: 
Indiana (USA)

Offer summary

Qualifications:

Proven experience in cyber threat detection projects, Expertise in data science and cyber intelligence, Familiarity with MITRE ATTCK framework.

Key responsabilities:

  • Develop AI algorithms for threat detection
  • Conduct Investigative Data Analysis for training datasets
  • Oversee content library development for AI training
Simbian logo
Simbian Computer Hardware & Networking Startup https://simbian.ai/
11 - 50 Employees
See more Simbian offers

Job description

As a Threat Hunter Analyst, you will play a crucial role in our product development team by contributing to the design and implementation of autonomous AI agents for cybersecurity. Your expertise will guide the development of advanced threat detection algorithms and the creation of training datasets that enable these agents to identify and mitigate cyber threats proactively. This position requires a deep understanding of the cyber threat landscape and the ability to translate this knowledge into effective AI-driven solutions.

  • Lead projects focused on the development of cybersecurity products, including the automation of threat intelligence and the integration of this intelligence into AI-driven threat hunting processes.
  • Develop and refine AI algorithms for threat detection and response, using machine learning to achieve high accuracy and low false positives in autonomous agents.
  • Design and implement SIEM use cases within our product offerings, continuously enhancing the AI's ability to detect threats and identify hunt engagement opportunities.
  • Conduct Investigative Data Analysis (IDA) to create high-quality training datasets from diverse data types and log sources, improving the AI's detection capabilities.
  • Oversee the development and maintenance of an analytical content library to train AI agents on monitoring and detecting advanced, emerging threats in simulated environments.
  • Research and integrate new indicators of compromise (IOCs) into our products, continuously updating the AI's threat detection capabilities based on the latest adversarial tactics, techniques, and procedures (TTPs).

Requirements

  • Proven experience as a principal contributor to cyber threat detection projects with a strong background in data science, cyber threat intelligence, and SIEM systems.
  • Expertise in using the MITRE ATT&CK framework for threat actor attribution and in conducting advanced traffic analysis to detect sophisticated cyber threats such as RDP Tunneling, Reflective DLL Loading, and Kerberoasting.
  • Experience in threat hunting using data from web-proxy and network logs, and the ability to correlate disparate data sources to derive comprehensive threat landscapes.
  • Ability to work closely with incident response teams, providing expert guidance on SIEM engagement and supporting both analyst and data science efforts in threat detection.
  • Strong leadership skills with experience in supervising teams responsible for developing security analytics content and maintaining threat hunting repositories.
  • Excellent communication and collaboration skills, capable of working with automation and development teams to enhance operational efficiency and technology integrations for improved threat hunting.

Required profile

Experience

Industry :
Computer Hardware & Networking
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Verbal Communication Skills
  • Organizational Skills
  • Leadership Development

Cyber Threat Intelligence Analyst Related jobs