Full-Time Threat Hunter
Western Digital is hiring a remote Full-Time Threat Hunter. The career level for this job opening is Experienced and is accepting USA based applicants remotely. Read complete job description before applying.
Western Digital
Job Title
Posted
Career Level
Career Level
Locations Accepted
Share
Job Details
We are seeking an experienced and proactive Threat Hunter to join our cybersecurity team. As a Threat Hunter, you will play a critical role in protecting our organization by proactively identifying, investigating, and mitigating threats before they can cause harm.
You will work closely with our Security Operations Center (SOC), incident response teams, and other IT stakeholders to stay ahead of emerging threats and ensure the security of our digital assets.
Key Responsibilities:
- Proactive Threat Hunting: Conduct advanced threat hunting activities to detect unknown and sophisticated threats that have bypassed traditional security defenses.
- Incident Response: Collaborate with the incident response team to investigate and respond to security incidents, providing expert analysis and support.
- Data Analysis: Analyze security alerts, network traffic, endpoint logs, and other data sources to identify anomalies and potential threats.
- Threat Intelligence: Integrate threat intelligence data into hunting activities, ensuring that the organization is aware of and protected against emerging threats.
- Tool Development: Develop and refine custom scripts, tools, and automation to enhance threat detection and hunting capabilities.
- Reporting: Document and report findings, including potential risks, vulnerabilities, and recommended remediation steps to key stakeholders.
- Collaboration: Work with other cybersecurity teams to improve detection rules, refine security policies, and enhance overall security posture.
- Continuous Improvement: Stay updated on the latest threat hunting techniques, tools, and best practices, and continuously improve the threat-hunting process.
Qualifications
Technical Skills:
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation and data analysis.
- Experience with SIEM tools, EDR solutions, and other security monitoring tools.
- Familiarity with threat intelligence platforms and OSINT techniques.
- Knowledge of malware analysis, digital forensics, and reverse engineering is a plus.
- Certifications such as GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA), Offensive Security Certified Professional (OSCP), or similar considered an asset.
Soft Skills:
- Strong analytical and pragmatic problem-solving abilities.
- Excellent communication skills, both written and verbal.
- Ability to work independently and as part of a team.
- High attention to detail and a commitment to staying ahead of emerging threats.
- Experience working with Security Operations Center (SOC) environment.
Understanding of regulatory and compliance requirements related to cybersecurity.