Job Search and Career Advice Platform

Enable job alerts via email!

Specialist I, Threat Hunting (TCF)

Concentrix

Remote

CAD 70,000 - 90,000

Full time

22 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A global customer experience solutions provider is seeking a Threat Hunter Specialist to join their Cyber Threat Operations team. This role involves proactively seeking threats and assessing impacts to enhance security measures. The ideal candidate will possess strong analytical skills, experience in threat hunting methodologies, and effective communication abilities. Responsibilities include automating detection methods, collaborating with cybersecurity teams, and providing security recommendations based on threat intelligence. This position is full-time and work-from-home based in Canada.

Qualifications

  • Ability to create automated detection methodologies.
  • Familiarity with the MITRE ATT&CK Framework.
  • Understanding of real-world vulnerabilities and exploits.

Responsibilities

  • Conduct threat hunts for known indicators across network environments.
  • Provide operational contributions with the Cybersecurity Incident Response team.
  • Produce threat hunt metrics and key performance indicators.

Skills

Threat hunting
Cybersecurity knowledge
Analytical skills
Communication skills
Job description

Specialist I, Threat Hunting (TCF)

Job Description

Concentrix Corporation, a global leader in Customer Experience Solutions, is seeking a Threat Hunter Specialist as an individual contributor, reporting to the Threat Hunt Leader within the Cyber Threat Operations and Countermeasures department under the Concentrix Global Security team. The Threat Hunter Specialist will be responsible for proactively seeking out threats, indicators of compromise, digital artifacts and evidence, misconfigurations, and control gaps. This role will collaborate and align closely with Cyber Defense, Vulnerability Management, and Incident Response teams to enhance prevention, detection, response, and remediation capabilities. The role is non‑managerial and will conduct threat hunts, ingest threat intelligence, provide remediation recommendations, and assess the impact of potential threat actors to Concentrix and its clientele. Additionally, the role will advise on new and emerging threats, search and determine gaps within configurations, deliver documentation with recommendations, and provide technology support to the overall Global Security mission.

Responsibilities
  • Create automated detection methodologies to discover suspicious and anomalous behaviors, identify command and control connections, and indicators of compromise.
  • Provide operational contributions with the Cybersecurity Incident Response team by understanding current and past incidents, and proactively seeking trends or specifics to prevent future similar occurrences.
  • Perform analysis of previously handled incidents to determine effectiveness and potential operational enhancements.
  • Produce threat hunt metrics and key performance indicators.
  • Partner with business areas to test and ensure effectiveness of detections and alerts.
  • Develop tactics, techniques, and procedures for the identification, detection, and analysis of internal and external threats.
  • Execute threat hunts for known indicators and indicator‑less artifacts in multiple network environments.
  • Conduct gap assessments on control library implementation and collaborate with stakeholders to enhance control hygiene.
  • Develop applicable process documentation and playbooks to operationalize workflows.
  • Partner with Threat Operation teams to conduct periodic cyber threat tabletop exercises and simulation scenarios.
  • Enhance enterprise‑wide security knowledge and controls with threat indicators, cyber findings, and lessons learned.
  • Collaborate with, and ingest threat intelligence from multiple sources.
  • Interact and participate with the global cybersecurity community through multiple partners, forums, and organizations.
  • Demonstrate a level of familiarity with real‑world vulnerabilities, exploits, payloads, and tactics across the threat actor spectrum.
  • Understand threat models and be intimately familiar with the MITRE ATT&CK Framework.
  • Interface with leadership and business partners through effective written and oral communication.
  • Ensure that leadership and key business personnel are educated and aware of both current and future threats, by communicating in a way that is easily understandable.

Location: PHL Work‑at‑Home

Language Requirements: English (Required)

Time Type: Full time

If you are a California resident, by submitting your information, you acknowledge that you have read and have access to the Job Applicant Privacy Notice for California Residents.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.