Senior Cybersecurity Threat Hunter

Caterpillar Inc.Nashville, TN
1dOnsite

About The Position

Your Work Shapes the World at Caterpillar Inc. When you join Caterpillar, you're joining a global team who cares not just about the work we do – but also about each other. We are the makers, problem solvers, and future world builders who are creating stronger, more sustainable communities. We don't just talk about progress and innovation here – we make it happen, with our customers, where we work and live. Together, we are building a better world, so we can all enjoy living in it. Senior Cybersecurity Threat Hunter What You Will Do: Conduct proactive threat hunting across Cloud and On‑Prem enterprise environments to identify malicious activity, anomalies, and emerging threats. Perform in‑depth investigations using SIEM technologies, leveraging strong query and analysis skills to detect adversary behaviors and indicators of compromise. Analyze authentication flows, access patterns, and system telemetry to uncover potential compromise or advanced attacker techniques. Utilize cyber threat intelligence, the MITRE ATT&CK framework, and emerging threat research to inform hunting strategies and detection engineering. Investigate and respond to high‑impact security incidents, collaborating closely with CSIRT and cross‑functional teams to contain and remediate threats. Partner with SIEM administrators, vendors, and offensive cybersecurity teams to enhance threat visibility and detection capabilities. Develop and maintain detection logic, contributing to the full detection development lifecycle and identifying opportunities for detection improvements. Apply offensive knowledge to strengthen hunting methodologies and validate detection coverage. Document findings, investigations, and procedures with strong writing, communication, and operational discipline. Support continuous improvement efforts, including planning, operational procedure refinement, and readiness activities within the CSIRT. Provide after‑hours support as part of a rotating on‑call schedule, including responding to high‑priority alerts and security incidents.

Requirements

  • Experience in cybersecurity within a global enterprise environment.
  • Experience performing Cybersecurity Threat Hunting across Cloud and On‑Prem environments.
  • Experience with offensive security techniques and applying that knowledge to improve detection and hunting.
  • Strong understanding of incident response operations, tools, methodologies, and investigation workflows.
  • Knowledge of threat hunting methodologies, cyber threat intelligence, and the MITRE ATT&CK framework.
  • Experience working within SIEM platforms, including building and tuning queries and analyzing diverse log sources.
  • Ability to develop and enhance detection logic and contribute to the detection engineering lifecycle.
  • Strong documentation, writing, and communication skills for both technical and non‑technical audiences.
  • Ability to collaborate effectively across SIEM administrators, vendors, offensive security teams, and CSIRT.

Responsibilities

  • Conduct proactive threat hunting across Cloud and On‑Prem enterprise environments to identify malicious activity, anomalies, and emerging threats.
  • Perform in‑depth investigations using SIEM technologies, leveraging strong query and analysis skills to detect adversary behaviors and indicators of compromise.
  • Analyze authentication flows, access patterns, and system telemetry to uncover potential compromise or advanced attacker techniques.
  • Utilize cyber threat intelligence, the MITRE ATT&CK framework, and emerging threat research to inform hunting strategies and detection engineering.
  • Investigate and respond to high‑impact security incidents, collaborating closely with CSIRT and cross‑functional teams to contain and remediate threats.
  • Partner with SIEM administrators, vendors, and offensive cybersecurity teams to enhance threat visibility and detection capabilities.
  • Develop and maintain detection logic, contributing to the full detection development lifecycle and identifying opportunities for detection improvements.
  • Apply offensive knowledge to strengthen hunting methodologies and validate detection coverage.
  • Document findings, investigations, and procedures with strong writing, communication, and operational discipline.
  • Support continuous improvement efforts, including planning, operational procedure refinement, and readiness activities within the CSIRT.
  • Provide after‑hours support as part of a rotating on‑call schedule, including responding to high‑priority alerts and security incidents.

Benefits

  • Medical, dental, and vision benefits
  • Paid time off plan (Vacation, Holidays, Volunteer, etc.)
  • 401(k) savings plans
  • Health Savings Account (HSA)
  • Flexible Spending Accounts (FSAs)
  • Health Lifestyle Programs
  • Employee Assistance Program
  • Voluntary Benefits and Employee Discounts
  • Career Development
  • Incentive bonus
  • Disability benefits
  • Life Insurance
  • Parental leave
  • Adoption benefits
  • Tuition Reimbursement

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

No Education Listed

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service