Staff Threat Hunter leading threat hunting methodologies and detection strategies at TENEX's Managed Detection and Response provider. Working across multi-tenant ADR telemetry using Google SecOps and Chronicle.
Responsibilities
Lead proactive, hypothesis-driven hunts.
Own the hunt methodology.
Drive the detection engineering partnership.
Operationalize Threat Intelligence.
Mentor SOC analysts and junior hunters.
Lead complex incident investigations.
Report on program outcomes.
Requirements
8+ years in threat hunting, SOC, or incident response, with at least 3 in a senior/lead capacity
Deep hands-on experience running hypothesis-driven hunts across SIEM and EDR telemetry in enterprise or MDR environments
Hands-on hunting experience in Google SecOps / Chronicle, or equivalent cloud-native SIEM (Sentinel, Splunk Cloud) with willingness to standardize on Chronicle
Strong command of attacker TTPs and MITRE ATT&CK — you can map an intrusion from initial access through impact and explain the detection gap at each stage
Scripting fluency in Python and/or PowerShell for hunt tooling, telemetry parsing, and detection automation
Microsoft security stack (Sentinel, Defender) depth
Market Intelligence Analyst monitoring health sector movements at Sabará Hospital Infantil in Brazil. Analyzing performance and developing strategic initiatives.
Analista de Inteligência e Performance na Motz, uma transportadora digital que conecta embarcadores e caminhoneiros. Foco em otimização de performance comercial e mensageria.
Product Intelligence Analyst at Dematic focusing on data visualization and strategic decision - making across functions. Collaborates with global teams in North America and EMEA to optimize product strategies and performance.
Data & Logistics Intelligence Analyst focused on advanced data analysis and automation for industrial projects at ALTEN México. Collaborating on data validation and integration from multiple systems.
Tier III Analyst supporting advanced threat hunting and incident response in a Virtual Security Operations Center environment. Requires strong analytical skills and 4+ years of experience in cybersecurity operations.
Analyst responsible for monitoring commercial performance at Localiza&Co to support decision making and continuous improvement. Engaging in sales performance tracking and pipeline management.
Join NordVPN as a Principal Threat Intelligence Researcher shaping Threat Protection capabilities. Lead research excellence for online security, working alongside expert teams.
Competitive Intelligence Analyst at Wilson Sonsini conducting in - depth research and analysis for client development. Collaborating with cross - functional teams and staying abreast of legal industry trends.
Senior Provider Network Intelligence Analyst at Banner Health leading data - driven solutions and innovative process improvement initiatives. Collaborating on key projects and automating workflows to enhance healthcare operations.