Piper Companies
Piper Companies is seeking a
Threat Hunter
to work for a leader in the technology industry. The
Threat Hunter
will be responsible for proactively identifying and mitigating threats using advanced SPL queries within Splunk. The
Threat Hunter
role is a hybrid position requiring to work in the office at least 2 days a week.
Responsibilities of the Threat Hunter
include: • Develop and execute SPL queries to identify indicators of compromise (IOCs), anomalous behavior, and potential threats. • Perform proactive threat hunting across endpoints, network traffic, and cloud environments. • Collaborate with SOC analysts, incident responders, and security engineers to enhance detection capabilities.
Requirements of the Threat Hunter
include: • 3+ years of experience in cybersecurity, with a focus on threat hunting or incident response. • Strong proficiency in Splunk SPL for threat detection and data analysis. • Experience with EDR tools (e.g., CrowdStrike, SentinelOne), SIEM platforms, and network monitoring tools.
Compensation for the Threat Hunter
include: • Salary: $120,000 - $135,000 • Full comprehensive benefits package including medical, dental, vision, 401K, PTO, sick leave as required by law
This job opens for applications September 29, 2025. Applications for this job will be accepted for at least 30 days from the posting date.
Keywords: Threat hunting, SPL, Splunk, cybersecurity, incident response, threat detection, MITRE ATT&CK, EDR, SIEM, log analysis, IOCs, threat intelligence, network security, cloud security, proactive defense, data analytics, security operations, playbook development, APT detection.
#HYBRID
#LN-JN1
Threat Hunter
to work for a leader in the technology industry. The
Threat Hunter
will be responsible for proactively identifying and mitigating threats using advanced SPL queries within Splunk. The
Threat Hunter
role is a hybrid position requiring to work in the office at least 2 days a week.
Responsibilities of the Threat Hunter
include: • Develop and execute SPL queries to identify indicators of compromise (IOCs), anomalous behavior, and potential threats. • Perform proactive threat hunting across endpoints, network traffic, and cloud environments. • Collaborate with SOC analysts, incident responders, and security engineers to enhance detection capabilities.
Requirements of the Threat Hunter
include: • 3+ years of experience in cybersecurity, with a focus on threat hunting or incident response. • Strong proficiency in Splunk SPL for threat detection and data analysis. • Experience with EDR tools (e.g., CrowdStrike, SentinelOne), SIEM platforms, and network monitoring tools.
Compensation for the Threat Hunter
include: • Salary: $120,000 - $135,000 • Full comprehensive benefits package including medical, dental, vision, 401K, PTO, sick leave as required by law
This job opens for applications September 29, 2025. Applications for this job will be accepted for at least 30 days from the posting date.
Keywords: Threat hunting, SPL, Splunk, cybersecurity, incident response, threat detection, MITRE ATT&CK, EDR, SIEM, log analysis, IOCs, threat intelligence, network security, cloud security, proactive defense, data analytics, security operations, playbook development, APT detection.
#HYBRID
#LN-JN1