Senior Security Researcher at Hunters
Tel-Aviv, Tel-Aviv District, Israel -
Full Time


Start Date

Immediate

Expiry Date

17 Jan, 26

Salary

0.0

Posted On

19 Oct, 25

Experience

5 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Threat Analysis, Incident Investigation, False Positive Reduction, Thought Leadership, Data Analysis, Python, SQL, Malware Analysis, Cloud Technologies, Network Protocols, Kubernetes, Active Directory, Office 365, Identity & SSO Products, Mentoring, Public Speaking

Industry

Computer and Network Security

Description
Description Hunters Next-Gen SIEM helps small security teams be more effective and efficient by automating the entire threat detection, investigation, and response process. Hunters deploys in days and eliminates repetitive work with out-of-the-box integrations and detection rules. High priority alerts are surfaced based on risk and confidence scoring, and similar alerts are clustered together, reducing alert triage by 80%. Customers can build an open, scalable data lake at a predictable cost, and bring their own data lake or leverage Hunters’. Team Axon provides rapid response to emerging threats, incident investigation, proactive threat hunting, and security posture and hygiene reporting. Hunters was recognized as a Leader in the 2024 GigaOm Radar for SIEM and received an Honorable Mention in the 2024 Gartner Magic Quadrant for SIEM. Learn how companies like Booking.com, Synthesia, TheRealReal and Cimpress are leveraging Hunters to empower their security teams at https://www.hunters.security. We are looking for a top-notch Senior Security Researcher, to resolve the toughest issue in cybersecurity: utilizing terabytes of data for detecting attacks, incident investigation and prioritizing threats. Responsibilities Threat Analysis and Research: Dive deep into terabytes of data to identify new attack vectors, emerging threats, and vulnerabilities across various attack surfaces. Stay up-to-date with the latest cybersecurity trends and contribute to the development of cutting-edge threat detection methodologies. Incident Investigation: Utilize your technical prowess to investigate complex security incidents, analyzing data from diverse sources to uncover the root causes and methods of attack. Collaborate with incident response teams to develop effective strategies for containment and mitigation. False Positive Reduction: Leverage your expertise in data analysis and correlation to fine-tune detection rules and algorithms, minimizing false positives and enhancing the accuracy of our platform's threat alerts. Thought Leadership and Community Engagement: Drive thought leadership initiatives by creating technical blog posts, delivering webinars, and speaking at conferences to share insights, educate the community, and enhance the company's reputation in the cybersecurity landscape. Be at the forefront of the Hunters mission and work closely with Hunters customers regarding cyber security investigations and incidents detected in their environments Requirements A background of at least 7 years in: Blue Teaming / Threat Hunting Incident Response Red Teaming / Penetration Testing - Advantage Malware analysis experience - Advantage Solid understanding of various enterprise technologies, such as: OS internals, EDR Active Directory, Office 365 Cloud technologies such as AWS, Microsoft Azure and GCP Network protocols and security products Identity & SSO products such as Okta, Auth0 and OneLogin Kubernetes Experience with Python, SQL or similar data analysis capabilities Experience around working with customers - Advantage Experience around writing blog posts, research papers, and public speaking - Advantage Experience with mentoring and training of security researchers - Advantage Proficient in English (both written and spoken)
Responsibilities
The Senior Security Researcher will analyze terabytes of data to identify new attack vectors and investigate complex security incidents. They will also collaborate with incident response teams and contribute to the development of threat detection methodologies.
Loading...