Threat Hunter

DeepwatchTampa, FL
1d$94,500 - $118,000

About The Position

Deepwatch is seeking a motivated and analytically driven Junior Threat Hunter to join our Security Operations team. You will work alongside experienced hunters, threat intelligence, threat research and incident responders to identify advanced threats that evade traditional controls. This role offers hands-on exposure to enterprise telemetry, detection engineering, and real-world adversary tradecraft.

Requirements

  • 4+ years in cybersecurity with at least 2 years in threat hunting, advanced detection engineering, or incident response.
  • Strong experience with EDR platforms (CrowdStrike, Microsoft Defender, SentinelOne, etc.).
  • Proficiency in SIEM platforms (Splunk, Sentinel, Elastic, QRadar, etc.).
  • Experience writing advanced queries (KQL, SPL, SQL, Lucene, etc.).
  • Deep understanding of Windows, Linux, and Active Directory internals.
  • Strong knowledge of Cloud services (AWS, Azure, Google Cloud, etc.)
  • Familiarity with MITRE ATT&CK framework.
  • Experience analyzing process trees, command-line artifacts, persistence mechanisms, and lateral movement.
  • Strong knowledge of networking fundamentals and common attack techniques.
  • Ability to independently conduct investigations from hypothesis to conclusion.
  • Strong written and verbal communication skills.

Nice To Haves

  • Knowledge of identity-based attacks (OAuth abuse, token theft, Kerberos abuse).
  • Experience with scripting (Python, PowerShell, Bash).
  • Background in detection engineering or purple teaming.
  • Industry certifications such as GCFA, GCIA, GCIH, GCED, CISSP, or similar.
  • Experience working in an MDR or MSSP environment.

Responsibilities

  • Assist in proactive, hypothesis-driven threat hunts across endpoint, network, cloud, and identity environments.
  • Analyze telemetry from EDR, SIEM, NDR, email, and identity platforms.
  • Investigate suspicious activity and anomalies to determine malicious vs. benign behavior.
  • Support development and tuning of detection rules and analytics.
  • Leverage the MITRE ATT&CK framework to understand and map adversary techniques.
  • Document hunt findings, methodologies, and lessons learned.
  • Collaborate with SOC and Incident Response teams to escalate validated threats.
  • Contribute to continuous improvement of detection coverage and hunting playbooks.
  • Stay current on emerging threats, malware trends, and attacker techniques.

Benefits

  • Medical, dental, vision, and disability insurance
  • Flexible Time Off (FTO), 12 company holidays, sick leave and 8-Weeks Paid Parental Leave
  • Unique professional development benefits with Annual “development dollars” to support our people growth and development
  • Wellness contests and monthly educational programs
  • 401(K) retirement program

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Entry Level

Education Level

No Education Listed

Number of Employees

101-250 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service