Lead Engineeer - Threat Hunting & Countermeasures

TargetBrooklyn Park, MN
1d$132,000 - $238,000Hybrid

About The Position

As a Lead Engineer – Threat Hunting and Countermeasures, you will help advance Target’s ability to detect and understand sophisticated threats by combining threat hunting expertise with strong data and analytical capabilities. This role is centered on proactive, hypothesis-driven hunting, but it is equally grounded in the ability to work at scale across large, complex datasets to identify meaningful patterns, anomalies, and indicators of adversary behavior. You will apply statistical methods, security analytics, and machine learning techniques to transform hunting concepts into scalable, repeatable detection strategies. Working across security, detection engineering, and intelligence functions, you will investigate emerging threats, develop countermeasures, improve visibility, and strengthen Target’s overall defensive posture. This role is ideal for someone who is deeply technical, analytically driven, and excited to blend hands-on hunting with modern data science approaches in cyber defense. Core responsibilities of this job are described within this job description. Job duties may change at any time due to business needs.

Requirements

  • 4-year degree in cybersecurity, computer science, data science, or a related field, or equivalent practical experience.
  • 7+ years of experience in cybersecurity, including at least 3 years focused on developing detections informed by threat intelligence, adversary behaviors, and/or data science and machine learning techniques.
  • Experience processing and analyzing large-scale datasets using platforms such as BigQuery, Snowflake, Databricks, or similar technologies.
  • Strong data engineering fundamentals, including building and maintaining data pipelines (e.g., ETL workflows, streaming, or batch processing).
  • Experience applying data science and machine learning techniques (e.g., anomaly detection, classification, clustering, behavioral modeling) to cybersecurity problems.
  • Experience developing, deploying, and tuning production-ready detections using statistical or machine learning–based approaches.
  • Strong familiarity with SIEM platforms, EDR solutions, and security data analytics.
  • Experience scripting (e.g. Python, PowerShell, Bash) to automate security tasks and enhance threat hunting workflows.
  • Deep understanding of adversary tactics, techniques, and procedures (TTPs) and frameworks such as MITRE ATT&CK and the Cyber Kill Chain.
  • Strong analytical and problem-solving skills, with the ability to interpret large datasets and identify malicious activity.
  • Strong communication skills, with the ability to navigate ambiguity and collaborate effectively across security teams.

Nice To Haves

  • Experience developing, deploying, and tuning production-ready detections using statistical or machine learning–based approaches.
  • Experience with deception techniques, honeytokens, or other adversary engagement strategies.
  • Background in malware analysis, reverse engineering, exploit development, digital forensics, or network security monitoring.
  • Experience applying LLMs to security use cases (e.g., log analysis, alert triage, enrichment, or detection augmentation).
  • Experience with feature engineering for security telemetry or graph-based threat detection.
  • Relevant certifications such as GIAC Machine Learning Engineer (GMLE), GREM, GCFA, or similar advanced cybersecurity or data science credentials.

Responsibilities

  • Process and analyze large-scale security datasets using platforms such as BigQuery or similar data environments to identify behavioral patterns, establish baselines, and surface anomalous activity.
  • Conduct structured, hypothesis-driven threat hunts informed by threat intelligence, adversary tradecraft, and behavioral analytics.
  • Apply statistical analysis, anomaly detection, and machine learning techniques to improve threat detection, investigation, and prioritization workflows.
  • Design, develop, operationalize, and tune production-ready detections, including data-driven and machine learning-based approaches, to identify novel or evasive threats.
  • Build and enhance scalable analytics and detection pipelines in partnership with detection engineering, data engineering, and platform teams.
  • Investigate emerging threats, adversary techniques, and security incidents to refine hunt methodologies and detection strategies.
  • Collaborate with incident response, detection engineering, cyber threat intelligence, and other security partners to validate findings and improve security coverage.
  • Partner with red and blue teams to test detections, strengthen countermeasures, and expand visibility across the enterprise.
  • Contribute to threat modeling and adversary research to continuously improve threat hunting practices and defensive capabilities.

Benefits

  • Target offers eligible team members and their dependents comprehensive health benefits and programs, which may include medical, vision, dental, life insurance and more, to help you and your family take care of your whole selves.
  • Other benefits for eligible team members include 401(k), employee discount, short term disability, long term disability, paid sick leave, paid national holidays, and paid vacation.
  • Find competitive benefits from financial and education to well-being and beyond at https://corporate.target.com/careers/benefits.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service