Job Description
Title: Threat Hunting Lead
Location: Remote
Duration: Full Time
Role Overview
The Threat Hunter & CSIRT Lead is responsible for proactively identifying cyber threats, analysing threat intelligence, and supporting incident response activities. This role involves advanced threat hunting, forensic analysis, and collaboration with SOC and IR teams to strengthen the organization’s security posture. The position requires expertise in threat intelligence, hypothesis-driven hunting, and creating actionable insights for mitigation and remediation.
Mandatory Skills
- Should function as Threat Hunters or Incident Responders.
- Expertise in:
- Cloud environments
- Virtual machines (VMs)
- Containers
- Strong development-focused background.
Key Responsibilities
Threat Hunting & Intelligence
- Perform intelligence-driven network defense and proactive threat hunting across all platforms.
- Search for hidden cyber threats and risks before attacks occur.
- Gather and analyze threat behavior, goals, and methods to identify trends and vulnerabilities.
- Develop threat hunting scenarios, hypotheses, and IoC databases.
- Stay updated on latest and prevalent threats for effective hunts.
- Finalizing the Threat hunting scenarios and hypothesis
- Proactive threat hunting leveraging all platforms
- Creating IoC databases for threat hunting
Incident Response & CSIRT Support
- Provide threat intelligence support during security incidents.
- Deliver logs and forensic data as required by CSIRT and forensic teams.
- Collaborate with IR teams for containment and remediation strategies.
- Proficiency with AWS products and services, including security concepts like IAM, CloudTrail, GuardDuty, and integration with tools for automated response
Analysis & Reporting
- Analyze internal risk and security controls to identify weaknesses.
- Assess external and internal cyber threats and predict future risks.
- Consolidate threat intelligence feeds and sources for actionable insights.
- Prepare detailed monthly reports and present threat hunt scenarios to stakeholders and customers.
Process Development & Automation
- Create SOPs and process documents for threat hunting operations.
- Influence threat mitigation strategies and provide requirements for automation.
Collaboration & Communication
- Act as SME for threat hunting and intelligence in SOC.
- Coordinate with cross-functional teams for preventive and corrective measures.
Required Skills & Experience
- 6+ years of experience in threat hunting, threat intelligence, and forensic analysis out of which minimum 2 years of AWS experience is preferred.
- Strong knowledge of attack vectors, threat actor TTPs, and advanced detection techniques that leverages endpoints.
- Hands-on experience with enterprise security tools:
͏
Do
-
Ensuring customer centricity by providing apt cybersecurity
- Monitoring and safeguarding the log sources and security access
- Planning for disaster recovery in the event of any security breaches
- Monitor for attacks, intrusions and unusual, unauthorized or illegal activity
- Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems
- Conduct security assessments, risk analysis and root cause analysis of security incidents
- Handling incidents escalated by the L1 team in 24x7 rotational shifts
- Use advanced analytics tools to determine emerging threat patterns and vulnerabilities
- Completing all tactical security operations tasks associated with this engagement.
- Analyses all the attacks and come up with remedial attack analysis
- Conduct detailed analysis of incidents and create reports and dashboards
-
Stakeholder coordination & audit assistance
- Liaise with stakeholders in relation to cyber security issues and provide future recommendations
- Maintain an information security risk register and assist with internal and external audits relating to information security
- Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues
- Advice and guidance to employees on issues such as spam and unwanted or malicious emails
͏
Deliver
|
No. |
Performance Parameter |
Measure |
|
1. |
Customer centricity |
Timely security breach solutioning to end users, Internal stakeholders & external customers experience |
|
2. |
Process Adherence |
Adherence to SLAâÃÂÃÂs (90-95%), response time and resolution time TAT |
͏
͏
Experience: 5-8 Years .
The expected compensation for this role ranges from $60,000 to $135,000 .
Final compensation will depend on various factors, including your geographical location, minimum wage obligations, skills, and relevant experience. Based on the position, the role is also eligible for Wipro's standard benefits including a full range of medical and dental benefits options, disability insurance, paid time off (inclusive of sick leave), other paid and unpaid leave options.
Applicants are advised that employment in some roles may be conditioned on successful completion of a post-offer drug screening, subject to applicable state law.
Wipro provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Applications from veterans and people with disabilities are explicitly welcome.
Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention.