Quick Summary
Proactive Threat Hunting · Execute hypothesis-driven hunts based on adversary TTPs and threat intelligence. · Analyze telemetry from SIEM, EDR/XDR, NDR,
Why we're hiring:
The Threat Hunter is responsible for proactively identifying advanced threats that evade traditional security controls. This role involves hypothesis-driven investigations, leveraging threat intelligence, and analyzing telemetry across endpoints, networks, and cloud environments to uncover stealthy adversary activity. The Threat Hunter plays a critical role in reducing dwell time and strengthening organizational resilience under the Autonomic Security Operations model.
What you'll be doing:
· Execute hypothesis-driven hunts based on adversary TTPs and threat intelligence.
· Analyze telemetry from SIEM, EDR/XDR, NDR, and cloud-native platforms to identify anomalies.
· Develop and maintain hunting queries and scripts for automation and repeatability.
· Validate detection coverage through purple team exercises and adversary emulation.
· Incorporate emerging threat intelligence into hunting hypotheses and detection pipelines.
· Maintain awareness of global threat actor tactics, techniques, and procedures (MITRE ATT&CK).
· Document hunt findings and feed insights into detection engineering and SOC workflows.
· Maintain a backlog of hunting hypotheses and visibility gaps for remediation.
· Contribute to automation of hunting workflows using scripting and SOAR platforms.
· 10X People: Continuous learning and knowledge sharing within the team.
· 10X Process: Embed agile, hypothesis-driven hunting workflows.
· 10X Technology: Leverage AI/ML analytics for anomaly detection and hunt acceleration.
· 10X Visibility: Ensure comprehensive telemetry ingestion across hybrid environments.
· 10X Speed: Reduce dwell time and accelerate detection-to-response cycles.
What you'll need:
· Strong knowledge of threat hunting methodologies and frameworks (MITRE ATT&CK, TaHiTI).
· Proficiency in SIEM, EDR/XDR, and log aggregation tools across hybrid infrastructure.
· Scripting skills (Python, PowerShell) for automation and data analysis.
· Familiarity with threat intelligence integration and behavioral analytics.
· Ability to work closely with SOC, IR, and engineering teams.
· Skilled in documenting hunt outcomes and communicating findings effectively.
Nice to Have
~1 min read· GIAC GCTI, GCIH, or equivalent advanced security certifications.
· Automation-first mindset with focus on scalability and resilience.
· Strong analytical and problem-solving skills.
· Excellent communication and teamwork capabilities.
Who you are:
What We Offer
~1 min readLocation & Eligibility
Listing Details
- Posted
- April 27, 2026
- First seen
- April 27, 2026
- Last seen
- May 3, 2026
Posting Health
- Days active
- 6
- Repost count
- 0
- Trust Level
- 45%
- Scored at
- May 3, 2026
Signal breakdown
Please let Wpp know you found this job on Jobera.
3 other jobs at Wpp
View all →Explore open roles at Wpp.
Similar Security jobs
View all →Browse Similar Jobs
Stay ahead of the market
Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.
No spam. Unsubscribe at any time.
