Motion Recruitment
Job DescriptionA global leader in digital automation and energy management is seeking a SOC Threat Hunt Analyst to join its premier North American cybersecurity hub. This role focuses on protecting critical infrastructure and industrial control systems by proactively identifying advanced cyber threats in OT environments.
If you would like to know a bit more about this opportunity, or are considering applying, then please read the following job information.
This is a high-impact position within a global 24/7 Managed SOC supporting national and international clients in the energy, manufacturing, and utilities sectors. You’ll be part of a forward-thinking team driving innovation in threat detection, cyber analytics, and incident response-leveraging cutting-edge tools and a deep knowledge of industrial environments. If you’re passionate about staying ahead of adversaries and shaping the future of OT cybersecurity, this is your opportunity.
This is a full-time onsite position. Required Skills & Experience 3–5 years in security operations, including 1+ years conducting threat hunts or similar advanced analysis Working knowledge of threat behavior analytics and detection logic design Familiarity with ATT&CK for ICS or similar frameworks Strong critical thinking, investigation, and communication skills Desired Skills & Experience
Experience with KQL or other query languages for large data sets Background in OT security or ICS protocol awareness Understanding of standards such as NIST CSF, ISO 27001, and sector-specific guidelines (e.g., NIST 800-82) Exposure to SOAR platforms and automated hunt workflows Relevant certifications (e.g., GCIH, GCDA, GICSP, GRID, CISSP, CEH) What You Will Be DoingTech Breakdown
70% Deep-dive threat hunts, detection logic creation, and data analysis 30% Strategy collaboration, documentation, and process improvement The Offer
Bonus
OR
Commission eligible You will receive the following benefits:
Medical Insurance Dental Benefits Vision Benefits Paid Time Off (PTO) 401(k) {including match- if applicable}
Applicants must be currently authorized to work in the US on a full-time basis now and in the future.
#J-18808-Ljbffr
If you would like to know a bit more about this opportunity, or are considering applying, then please read the following job information.
This is a high-impact position within a global 24/7 Managed SOC supporting national and international clients in the energy, manufacturing, and utilities sectors. You’ll be part of a forward-thinking team driving innovation in threat detection, cyber analytics, and incident response-leveraging cutting-edge tools and a deep knowledge of industrial environments. If you’re passionate about staying ahead of adversaries and shaping the future of OT cybersecurity, this is your opportunity.
This is a full-time onsite position. Required Skills & Experience 3–5 years in security operations, including 1+ years conducting threat hunts or similar advanced analysis Working knowledge of threat behavior analytics and detection logic design Familiarity with ATT&CK for ICS or similar frameworks Strong critical thinking, investigation, and communication skills Desired Skills & Experience
Experience with KQL or other query languages for large data sets Background in OT security or ICS protocol awareness Understanding of standards such as NIST CSF, ISO 27001, and sector-specific guidelines (e.g., NIST 800-82) Exposure to SOAR platforms and automated hunt workflows Relevant certifications (e.g., GCIH, GCDA, GICSP, GRID, CISSP, CEH) What You Will Be DoingTech Breakdown
70% Deep-dive threat hunts, detection logic creation, and data analysis 30% Strategy collaboration, documentation, and process improvement The Offer
Bonus
OR
Commission eligible You will receive the following benefits:
Medical Insurance Dental Benefits Vision Benefits Paid Time Off (PTO) 401(k) {including match- if applicable}
Applicants must be currently authorized to work in the US on a full-time basis now and in the future.
#J-18808-Ljbffr