you'll be responsible for :
- Analyze emerging threats, adversarial behaviors, and tactics, techniques, and procedures (TTPs) to understand attacker methodologies and improve detection capabilities
- Conducting proactive and retroactive threat hunting using Zscaler telemetry drawing from proven experience in behavioral-based threat hunting
- Researching, analyzing, validating, and clearly documenting threat hunting findings
- Independently hunting and responding to customers while working flexible schedules, including weekend night shifts and providing on-call support as needed to meet operational demands while getting two days off during the weekdays
What We're Looking for (Minimum Qualifications)
Proven experience in one or more of the following - threat hunting, incident response, security operations, malware analysis, blue teaming, purple teaming or network defenceHands-on experience in a Security Information and Event Management (SIEM) tool, such as Splunk, Microsoft Sentinel, or ElasticSearchFamiliarity with MITRE ATT&CK framework and modern Tactics, Techniques, and Procedures (TTPs)Bachelor's or graduate degree from four-year college or university (preferably in Computer Science, Engineering, or a related discipline), or equivalent security industry work experienceWhat Will Make You Stand Out (Preferred Qualifications)
Must be able to validate findings, perform root cause analysis, and deliver recommendationsScripting and automation skills (Python preferable)Must have excellent reporting and analytical skills and experience writing IDS / IPS, YARA signaturesExperience in network-based threat detectionSkills Required
Security Information and Event Management, Elastic Search, Python