Threat Hunt Analyst

Position Overview

Threat Hunters are responsible for identifying malicious activity in organizations that bypass security controls. As a Threat Hunter, you will be expected to be on the cutting edge of research and up to date with the current attacker tactics and techniques. Threat Hunters are expected to be familiar with the customer’s business and the common threats targeting their verticals and technologies. Threat Hunters must be able to effectively communicate with customers, clearly articulate their observations and provide guidance on the results of their hunts. In addition to performing threat hunts, you will be expected to disseminate collected intelligence to Netenrich Security Operations.



  • Leverage available tools within the scope of a customer’s environment to track anomalous activity and seek malicious actors
  • Provide Incident Response support and perform threat hunting in client environments
  • Validate suspicious events and incidents using open-source and proprietary intelligence sources
  • Document new tools and techniques and disseminate them to the rest of the team
  • Report, document and manage incidents in a case management system
  • Interface with customers to resolve issues, provide additional information, and answer questions related to incidents and hunt efforts
  • Keep up to date with information security news, techniques, and trends
  • Escalate any gaps in log collection or reporting as soon as possible if identified
  • Produce content regarding new threats, techniques and information for internal and external consumption (hunts, dashboards, alerts, reports, playbooks, use cases, blogs, etc.)
  • Threat Assessment and Planning (Threat Modeling)


Skills and Knowledge Requirements

Must have advanced skills/knowledge in several of the following areas:

  • Incident Handling and Response
  • Operating Systems and Networks
  • Digital Forensics & Incident Response (DFIR)
  • Malware Analysis
  • Reverse Engineering
  • Threat Intelligence
  • Network Traffic Analysis
  • Threat Hunting
  • Penetration Testing
  • Attacker methodology including the tactics, techniques, and procedures
  • Scripting, coding, API programming, tool development


Desired Experience

  • Strong communication skills
  • Excellent customer service skills
  • Excellent analytical thinking and problem-solving skills
  • Self-managed/directed and team oriented
  • Strong project management skills
  • Deadline and detail oriented
  • Highly self-motivated



At least 5 years of experience in cybersecurity research, operations or consulting.


Apply Job Form

  • The size of your upload can't be more than 2MB. Only .docx and .pdf file extensions are allowed.
  • * The fields marked with asterisks are mandatory