Join a cutting-edge cybersecurity startup at the forefront of innovation! We're tackling the growing challenge of overwhelming security alerts with a novel, AI-powered approach. Imagine being part of a team that's reducing threat investigation and response times by over 90%, empowering organizations to proactively defend against sophisticated cyberattacks.If you're a driven and experienced Threat Hunter eager to shape the future of cyber defense and build something truly impactful from the ground up, we want to hear from you.Key Responsibilities:● Develop high-fidelity, AI-ready detection templates to build detection rules in Sigma, KQL, SPL, Lucene, etc., for Microsoft Sentinel, Chronicle, Splunk, and Elastic. ● Leverage AI-powered engines to prioritize, cluster, and tune detection content dynamically based on environment behavior and telemetry changes. ● Identify visibility and data coverage gaps across cloud, identity, EDR, and SaaS log sources; work cross-functionally to close them. ● Lead proactive threat hunts driven by AI-assisted hypotheses, anomaly detection.● known threat actor TTPs. ● Contribute to AI-enhanced detection-as-code pipelines, integrating rules into CI/CD workflows and feedback loops. ● Collaborate with SOC, threat intel, and AI/data science teams to continuously evolve detection efficacy and reduce alert fatigue. ● Participate in adversary emulation, purple teaming, and post-incident reviews to drive continuous improvement. Required Skills:● 5+ years of hands-on experience in detection engineering, threat hunting, or security operations. ● Expert-level knowledge of at least two major SIEM platforms: Microsoft Sentinel, Google Chronicle, Splunk, Elastic, or similar. ● Strong proficiency in detection rule languages (Sigma, KQL, SPL, Lucene) and mapping to MITRE ATT&CK. ● Experience using or integrating AI/ML for detection enrichment, alert correlation, or anomaly-based hunting. ● Familiarity with telemetry sources (EDR, cloud, identity, DNS, proxy) and techniques to enrich or normalize them. ● Ability to document, test, and optimize detection rules and threat hunt queries in a modular, scalable fashion. ● Strong communication skills and the ability to translate complex threat scenarios into automated, AI-ready detection logic. Nice to Have ● Experience integrating AI/ML platforms for security analytics, behavior baselining, or entity risk scoring. ● Familiarity with detection-as-code and GitOps workflows for rule development, testing, and deployment.● Scripting knowledge (Python, PowerShell) for enrichment, custom detection logic, or automation. ● Experience with purple teaming tools like Atomic Red Team, SCYTHE, or Caldera.If you're ready to shape technical strategy and solve real-world Cyber Security problems at scale, we want to hear from you.Apply Now: Send your resume and a brief introduction to rajeshwari.vh@We are building the future of next evolution of AI-powered cyber defense. Join us!
Job Title
Cyber Security Analyst - Threat Hunter