Threat Hunter Position Available In Fulton, Georgia
Tallo's Job Summary: This job listing in Fulton - GA has been recently added. Tallo will add a summary here for this job shortly.
Job Description
Threat Hunter
IT/Computing Atlanta, Georgia
Direct Hire
Jun 4, 2025
Job Title:
Cyber Security Threat Hunter
Location:
Remote
Department:
Security Operations
Reports To:
Director of Security Operations
Job Type:
Full-Time
Position Summary:
We are seeking a skilled and motivated Cyber Security Threat Hunter to join our cybersecurity team. As a Threat Hunter, you will proactively search for signs of malicious activity within our digital environments, identify vulnerabilities, and help us stay ahead of emerging threats. This role is ideal for someone with a deep understanding of attacker tactics, techniques, and procedures (TTPs), and who thrives in a fast-paced, analytical, and mission-critical environment.
Key Responsibilities:
Proactively hunt for threats using a variety of tools, techniques, and threat intelligence.
Analyze large and complex data sets to uncover hidden threats and anomalous behavior.
Develop and refine hypotheses about potential threats based on internal and external threat intelligence.
Perform root cause analysis of security incidents and suggest mitigation strategies.
Collaborate with SOC analysts, incident responders, and other cybersecurity teams.
Develop and maintain custom detection rules and signatures based on findings or newly published CVEs.
Publish findings or new threat detections.
Document threat hunting methodologies, findings, and improvements.
Assist in the continuous improvement of threat detection and response capabilities.
Conduct purple team exercises and contribute to adversary simulation activities.
Required Qualifications:
Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or a related field (or equivalent experience).
3+ years of experience in threat hunting, security operations, or incident response.
Deep understanding of cybersecurity frameworks and threat models (e.g., MITRE ATT&CK).
Proficiency with SIEM tools: Splunk required, Others desired (e.g.,ELK, etc), EDR platforms, and threat intelligence platforms.
Experience in scripting and automation (e.g., Python, PowerShell, Bash).
Familiarity with Windows, Linux, and cloud (AWS, Azure, or GCP) environments.
Strong analytical, investigative, and problem-solving skills.
Excellent written and verbal communication skills.
Preferred Qualifications:
Relevant certifications such as GCTI, GCFA, GNFA, GREM, or OSCP.
Experience with threat modeling, digital forensics, or malware analysis.
Understanding of network protocols, packet analysis, and system internals.
Exposure to machine learning, Tier 3 AI models, or data science for threat detection is a plus.