Piper Companies
4 days ago Be among the first 25 applicants
Get AI-powered advice on this job and more exclusive features.
Piper Companies
is seeking an
Threat Hunter
to support an industry leader in technology. This position will be
hybrid
in
Raleigh, NC . The
Threat Hunter
will focus on proactively identifying cyber threats. Responsibilities of the Threat Hunter
include: Proactively hunt for cyber threats across on-premises and cloud environments (AWS and Azure). Utilize Splunk for advanced log analysis, threat detection, and incident response. Document all threat findings in ticketing systems and oversee remediation efforts to closure. Qualifications for the Threat Hunter
include: Bachelor’s degree in Computer Science, Engineering, or related field. Splunk Certification (e.g., Splunk Core Certified Power User, Splunk Enterprise Security Certified Admin). Hands-on experience with AWS and Azure cloud platforms. Strong knowledge of MITRE ATT&CK, threat intelligence, cyber kill chain, and PEAK Threat Hunting Framework (or similar). Compensation for the Threat Hunter
include: Salary Range: $115,000-135,000 Comprehensive Benefits: Cigna Medical, Dental, Vision, 401K, PTO, Sick Leave if required by law, and Holidays. This job opens for applications on 10/6/2025. Applications for this job will be accepted for at least 30 days from the posting date. Keywords: route, switch, networking, AWS, security, Splunk, Azure, Sentinel, defender, cloud, SIEM, logs, monitoring, incident, vulnerability, SOC, security operations, cloudtrail, alerts, triage, threat, threat hunt, hacking, vulnerabilities, risk, assessment #HYBRID Raleigh, NC We’re removing barriers to entry and providing inclusive opportunities for all qualified applicants.
#J-18808-Ljbffr
is seeking an
Threat Hunter
to support an industry leader in technology. This position will be
hybrid
in
Raleigh, NC . The
Threat Hunter
will focus on proactively identifying cyber threats. Responsibilities of the Threat Hunter
include: Proactively hunt for cyber threats across on-premises and cloud environments (AWS and Azure). Utilize Splunk for advanced log analysis, threat detection, and incident response. Document all threat findings in ticketing systems and oversee remediation efforts to closure. Qualifications for the Threat Hunter
include: Bachelor’s degree in Computer Science, Engineering, or related field. Splunk Certification (e.g., Splunk Core Certified Power User, Splunk Enterprise Security Certified Admin). Hands-on experience with AWS and Azure cloud platforms. Strong knowledge of MITRE ATT&CK, threat intelligence, cyber kill chain, and PEAK Threat Hunting Framework (or similar). Compensation for the Threat Hunter
include: Salary Range: $115,000-135,000 Comprehensive Benefits: Cigna Medical, Dental, Vision, 401K, PTO, Sick Leave if required by law, and Holidays. This job opens for applications on 10/6/2025. Applications for this job will be accepted for at least 30 days from the posting date. Keywords: route, switch, networking, AWS, security, Splunk, Azure, Sentinel, defender, cloud, SIEM, logs, monitoring, incident, vulnerability, SOC, security operations, cloudtrail, alerts, triage, threat, threat hunt, hacking, vulnerabilities, risk, assessment #HYBRID Raleigh, NC We’re removing barriers to entry and providing inclusive opportunities for all qualified applicants.
#J-18808-Ljbffr