Cyber Threat Hunt Senior Analyst, VP at Citi
Irving, Texas, United States -
Full Time


Start Date

Immediate

Expiry Date

13 Mar, 26

Salary

0.0

Posted On

13 Dec, 25

Experience

5 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Cyber Security, Threat Hunting, Incident Response, Security Analysis, Networking Protocols, Operating Systems, Security Technologies, SIEM, EDR Tools, Log Analysis, Threat Intelligence, Malware Analysis, Scripting Languages, Cloud Security, Data Science, Machine Learning

Industry

Financial Services

Description
Lead and conduct proactive, hypothesis-based threat hunting activities using various techniques and tools to identify malicious activity, potential security breaches, security gaps, and opportunities for improved detection strategies. Design, develop, and implement advanced threat hunting strategies based on industry best practices, threat intelligence, and organizational risk assessments. Analyze network traffic, system logs, and other data sources to detect anomalies, patterns, and indicators of compromise (IOCs). Collaborate with other security teams, such as the Security Operations Center (SOC), Incident Response, Red Team, and engineering teams to enhance security defenses and validate hunt findings. Architect, develop, and maintain comprehensive threat hunting playbooks, procedures, and documentation. Create and maintain detailed documentation for all hunt activities, including monthly hunt worksheets and formal hunt reports as part of the team's deliverables. Present findings to both technical and non-technical audiences, to include senior leaders and executive management. Serve as a subject matter expert (SME), providing advanced technical expertise and mentorship to other security team members. Bachelor's degree in Computer Science, Information Security, or a related field. Minimum of 5+ years of experience in cyber security, with a focus on threat hunting, incident response, or security analysis. Expert understanding of networking protocols, operating systems, and security technologies. Proficiency in analyzing data from security tools such as SIEM, EDR tools, and log analysis platforms (e.g., Splunk). Experience analyzing logs from various sources including firewalls, WAFs, proxies, and cloud environments. Experience with threat intelligence platforms and threat hunting frameworks. Knowledge of common attack techniques, malware families, and threat actor tactics, techniques, and procedures (TTPs). Ability to develop and implement threat hunting strategies based on industry best practices and threat intelligence. Strong analytical and problem-solving skills. Excellent written and verbal communication skills. Security certifications such as GIAC Certified Reverse Engineering Malware (GREM), Certified Information Systems Security Professional (CISSP), or GIAC Certified Threat Hunter (GCTH). Proven experience with scripting languages such as Python or PowerShell for automating security tasks and data analysis. In-depth knowledge of cloud security concepts and technologies. Experience with reverse engineering malware. Applied knowledge of data science and machine learning techniques for security analysis. ------------------------------------------------------ For complementary skills, please see above and/or contact the recruiter. ------------------------------------------------------ Anticipated Posting Close Date: Dec 19, 2025 ------------------------------------------------------
Responsibilities
Lead and conduct proactive threat hunting activities to identify malicious activity and potential security breaches. Collaborate with security teams to enhance defenses and validate findings.
Loading...