Logo
Insight Global

Cyber Threat Hunter

Insight Global, Atlanta, Georgia, United States, 30383

Save Job

This range is provided by Insight Global. Your actual pay will be based on your skills and experience — talk with your recruiter to learn more. Base pay range

$110,000.00/yr - $140,000.00/yr An Insight Global client is hiring a senior threat hunter, strong in digital forensics, malware analysis, and threat intelligence using SPLUNK. Contract to hire in Midtown (Atlanta), onsite 2-3 days per week. Key Responsibilities

Working with cybersecurity threats and vulnerabilities. Evaluating and recommending security tools and technologies to enhance incident response capabilities. Taking charge during major security incidents, coordinating the response team, and ensuring efficient execution of the incident response plan. Managing complex and large-scale security incidents, including those involving cloud environments, critical infrastructure, and sensitive data. Conducting in-depth forensic analysis of systems, networks, and logs to determine the root cause and scope of incidents. Providing clear and concise communication to stakeholders, including senior management, legal teams, and technical staff. Conducting post-incident reviews to identify lessons learned and improve incident response procedures. Preparing detailed incident reports and presentations. Proficiency in security tools and technologies (e.g., SIEM, EDR, forensic tools). Contributing to the development and maintenance of the incident response plan. Developing and implementing incident response strategies and playbooks. Developing and delivering incident response training for staff. Qualifications

Bachelor’s Degree required and at least 5 years of experience. Expertise in incident response methodologies and frameworks (e.g., NIST, SANS). Strong analytical and problem-solving skills. Excellent communication and interpersonal skills. Leadership and decision-making abilities. Experience with digital forensics, malware analysis, and threat intelligence using SPLUNK. Experience leading incident response teams. One or more intermediate cybersecurity certifications such as CEH, PenTest+, GIAC GCIA, GCFA, GCIH or equivalent. 6+ years of equivalent experience in Splunk/SIEM administration. Experience working in a mid-size organization (1500+ employees). Preferred

One or more advanced cybersecurity certifications such as OSCP, CISSP, CISM, or equivalent. Demonstrated experience in handling complex security incidents. Level 3

($106,200 - $118,000) – 5 years of relevant work experience with BS; 3 years with MS; 0 years with PhD. Level 4

($129,690 - $144,100) – 9 years with BS; 7 years with MS; 4 years with PhD. Seniority level

Mid-Senior level Employment type

Full-time Job function

Management Industries: Semiconductor Manufacturing

#J-18808-Ljbffr