Overview
We are looking for a Cyber Security Defensive Analyst with strong expertise in Threat Hunting and Threat Intelligence .
You will be responsible for detecting, analyzing, and responding to advanced threats using SIEM and EDR tools, while supporting incident response and proactive defense operations.
This role is part of a 24/7 global cyber defense function and requires strong technical, analytical, and communication skills.
Responsibilities
- Conduct threat hunting across endpoint and network data to identify anomalies, IOAs, and TTPs.
- Develop and maintain detection/prevention use cases in SIEM (Splunk ES) and EDR (CrowdStrike).
- Perform triage and technical analysis of alerts, determining scope and remediation actions.
- Leverage threat intelligence feeds (OSINT and premium sources) to enrich investigations.
- Provide clear reports and updates to stakeholders during incidents.
- Mentor junior analysts in threat hunting and incident response practices.
Qualifications
- Strong hands-on experience in Threat Hunting and Threat Intelligence (endpoint + network).
- Proficient with SIEM (Splunk ES) and EDR (CrowdStrike) .
- Strong understanding of attack lifecycle, common attack vectors, tools, and techniques.
- Ability to analyze large data sets to detect anomalies, IOAs, and TTPs.
- Excellent report writing and communication skills (English).
- Basic understanding of Mandarin is preferred but not mandatory (to support stakeholders in the region).
Desirable
- Experience with AI/ML in threat hunting.
- Exposure to OT/ICS and Cloud security environments.
- Experience with threat intelligence platforms and premium intel feeds.
- Relevant certifications (CISSP, GCIH, or similar).
#J-18808-Ljbffr