Ssquad Global Threat Hunter – Security Operations Team-Onsite Singapore
Company : SSquad PTE ( Deployed to client )
Location: Singapore (Onsite)
Work Schedule: Monday to Friday, 9:00 AM – 6:00 PM (44 hours/week)
Overtime: May be required.
Compensatory off will be granted (no additional allowance).
About the Role
We are looking for a skilled and experienced Threat Hunter to join our Security Operations team.
The ideal candidate is proactive, resourceful, and passionate about identifying and neutralizing advanced threats to strengthen our cyber defenses.
You will work closely with the Cyber Threat Intelligence (CTI), Incident Response, and Vulnerability Management teams to proactively hunt threats, investigate incidents, and develop innovative defense strategies using industry-standard frameworks like MITRE ATT&CK, PEAK, TAHITI, and more.
Key Responsibilities
Threat Hunting and Analysis
- Conduct proactive threat hunting across endpoints, networks, and cloud environments.
- Develop threat hypotheses based on threat intelligence and risk assessments.
- Use frameworks such as MITRE ATT&CK, PEAK, TAHITI, THMM, and the Diamond Model.
- Apply deep technical knowledge of adversary tactics, malware analysis, and cloud security.
Tooling and Automation
- Work with EDR/XDR, SIEM platforms, and threat hunting tools.
- Develop custom scripts (Python, PowerShell) to automate threat hunting.
- Use YARA rules, IOC analysis, and behavioral-based analysis techniques.
Incident Investigation
- Analyze logs, network traffic, and endpoint data to identify malicious activities.
- Investigate incidents, conduct root cause analysis, and provide remediation recommendations.
- Collaborate with internal security teams to share intelligence and improve detection.
Cyber Threat Intelligence (CTI)
- Develop and manage CTI, keeping up to date with emerging threats.
- Map adversary behavior to MITRE ATT&CK and generate actionable intelligence.
- Present findings to both technical and executive stakeholders.
Continuous Improvement
- Enhance threat hunting strategies, playbooks, and processes.
- Strengthen knowledge of internal systems to anticipate adversary behavior.
- Drive the maturity of overall security operations.
- Required Qualifications
- Bachelor's degree in Computer Science, Cybersecurity, or a related field.
- Minimum 3+ years in cybersecurity; 1–2 years in threat hunting roles.
- Strong OS knowledge (Windows, Linux, macOS).
- Proficiency in Python and PowerShell scripting.
- Hands-on experience with SIEM, EDR, and network monitoring tools.
- Strong problem-solving, analytical, and communication skills.
Preferred Qualifications
- Experience with CTI platforms, frameworks, and threat intelligence feeds.
- Relevant certifications (e.g., SANS GIAC, GNFA, GCFA, Offensive Security).
- Familiarity with cloud platforms (AWS, Azure, GCP) and container security.
If Interested please Apply:
Job Types: Full-time, Contract
Contract length: 12 months
Benefits: