Piper Companies
Piper Companies is seeking a Threat Hunter for a world leading technology organization in the Raleigh, North Carolina area. The Threat Hunter role is hybrid requiring onsite in the office 3 days a week. A successful candidate for the Threat Hunter will possess a strong background in identifying and mitigating threats.
Responsibilities for the Threat Hunter include: • Proactively search for hidden threats (e.g., APTs, malware, insider threats) across endpoints, networks, and cloud environments • Analyze logs, telemetry, and behavioral data from SIEM, EDR, and XDR platforms • Identify anomalies and suspicious patterns that evade traditional detection tools • Develop and tune detection rules (e.g., Sigma, YARA, Splunk SPL, KQL) • Create custom scripts and queries to automate threat hunting workflows • Integrate threat hunting tools with SIEM, EDR, and SOAR platforms
Requirements for the Threat Hunter include: • Over 4 years of professional threat hunting experience • Cloud background within AWS and Azure • Strong splunk expeirence and • Splunk SPL query language expertise • Understanding of MITRE ATT&CK
Compensation of the Threat Hunter includes: • $100,000 $135,000 annually with Full Comprehensive benefits package including Medical, Dental, Vision, 401K, PTO, Sick Leave as required by law • This job opens for applications on October 3, 2025. Applications for this job will be accepted for at least 30 days from the posting date.
Keywords: Threat Hunter
#LI-JA1
#LI-HYBRID
Responsibilities for the Threat Hunter include: • Proactively search for hidden threats (e.g., APTs, malware, insider threats) across endpoints, networks, and cloud environments • Analyze logs, telemetry, and behavioral data from SIEM, EDR, and XDR platforms • Identify anomalies and suspicious patterns that evade traditional detection tools • Develop and tune detection rules (e.g., Sigma, YARA, Splunk SPL, KQL) • Create custom scripts and queries to automate threat hunting workflows • Integrate threat hunting tools with SIEM, EDR, and SOAR platforms
Requirements for the Threat Hunter include: • Over 4 years of professional threat hunting experience • Cloud background within AWS and Azure • Strong splunk expeirence and • Splunk SPL query language expertise • Understanding of MITRE ATT&CK
Compensation of the Threat Hunter includes: • $100,000 $135,000 annually with Full Comprehensive benefits package including Medical, Dental, Vision, 401K, PTO, Sick Leave as required by law • This job opens for applications on October 3, 2025. Applications for this job will be accepted for at least 30 days from the posting date.
Keywords: Threat Hunter
#LI-JA1
#LI-HYBRID