Die KI-Suchmaschine für Jobs
Cyber Threat Hunter - Mid-Level(m/w/x)
Analyzing telemetry across endpoint, identity, network, and cloud to identify malicious activity for business application software. 2+ years professional experience in IR, Detection Engineering, or Threat Hunting required. Flexible working models.
Anforderungen
- Bachelor’s Degree in Computer Sciences, Information Technology, Cybersecurity, or comparable qualification
- 2+ years professional experience in IR, Detection Engineering, and/or Threat Hunting
- Familiarity with Windows, Linux, MacOS environments
- Experience with log analysis and security tooling (e.g., SIEM, EDR, IDS/IPS)
- Understanding of networking fundamentals (TCP/IP, DNS, HTTP/S)
- Ability to write and interpret programming languages (Python, PowerShell, JAVA, GO)
- Working knowledge of MITRE ATT&CK and Lockheed’s Cyber Kill Chain concepts
- Strong curiosity and analytical mindset
- Ability to identify patterns and correlate disparate data
- Detail-oriented approach to investigation and problem solving
- Willingness to learn and take direction
- Comfort working independently and collaboratively
- Good written and verbal communication skills
- Ability to articulate investigative findings to technical and non-technical stakeholders
- GIAC Security Operations Certified (GSOC)
- GIAC Certified Incident Handler (GCIH)
- GIAC Network Forensic Analyst (GNFA)
- GIAC Reverse Engineering Malware (GREM)
- CompTIA Security+
Aufgaben
- Develop threat hunting hypotheses from CTI reporting
- Create and execute queries for intelligence-aligned TTPs
- Analyze endpoint, identity, network, and cloud telemetry
- Correlate large data sets
- Identify malicious, suspicious, and anomalous activity
- Identify advanced adversary behaviors
- Identify emerging tradecraft
- Identify potential detection gaps
- Analyze anomalies against established baselines
- Perform triage and deeper analysis on suspicious findings
- Support hunts focused on MITRE ATT&CK techniques
- Collaborate with CTI, IR, and Engineering teams
- Operationalize validated hunt queries with Detection Engineering
- Translate intelligence into actionable hunts
- Develop new behavioral detections
- Support Incident Response with telemetry and findings
- Identify misconfigurations and potential vulnerabilities
- Document hunt findings clearly and reproducibly
- Map findings to the MITRE ATT&CK framework
- Improve hunting methodologies and playbooks
Berufserfahrung
- 2 Jahre
Ausbildung
- Bachelor-Abschluss
Sprachen
- Englisch – verhandlungssicher
Tools & Technologien
- Windows
- Linux
- MacOS
- SIEM
- EDR
- IDS/IPS
- TCP/IP
- DNS
- HTTP/S
- Python
- PowerShell
- JAVA
- GO
- MITRE ATT&CK
- Lockheed’s Cyber Kill Chain
Benefits
Weiterbildungsangebote
- Constant learning
- Skill growth
Lockere Unternehmenskultur
- Culture of inclusion
Gesundheits- & Fitnessangebote
- Focus on health and well-being
Flexibles Arbeiten
- Flexible working models
Noch nicht perfekt?
- SAPVollzeitnur vor OrtBerufserfahrenGarching bei München
- SAP
Senior Cyber Detection Engineer(m/w/x)
Vollzeitnur vor OrtSeniorGarching bei München - Guldberg GmbH
Cyber Incident Responder(m/w/x)
Vollzeitnur vor OrtBerufserfahrenMünchen - Guldberg GmbH
Cyber Defence Analyst(m/w/x)
Vollzeitnur vor OrtBerufserfahrenMünchen - Accenture
Quality Assurance and Risk Analyst(m/w/x)
Vollzeitnur vor OrtManagementMünchen
Cyber Threat Hunter - Mid-Level(m/w/x)
Analyzing telemetry across endpoint, identity, network, and cloud to identify malicious activity for business application software. 2+ years professional experience in IR, Detection Engineering, or Threat Hunting required. Flexible working models.
Anforderungen
- Bachelor’s Degree in Computer Sciences, Information Technology, Cybersecurity, or comparable qualification
- 2+ years professional experience in IR, Detection Engineering, and/or Threat Hunting
- Familiarity with Windows, Linux, MacOS environments
- Experience with log analysis and security tooling (e.g., SIEM, EDR, IDS/IPS)
- Understanding of networking fundamentals (TCP/IP, DNS, HTTP/S)
- Ability to write and interpret programming languages (Python, PowerShell, JAVA, GO)
- Working knowledge of MITRE ATT&CK and Lockheed’s Cyber Kill Chain concepts
- Strong curiosity and analytical mindset
- Ability to identify patterns and correlate disparate data
- Detail-oriented approach to investigation and problem solving
- Willingness to learn and take direction
- Comfort working independently and collaboratively
- Good written and verbal communication skills
- Ability to articulate investigative findings to technical and non-technical stakeholders
- GIAC Security Operations Certified (GSOC)
- GIAC Certified Incident Handler (GCIH)
- GIAC Network Forensic Analyst (GNFA)
- GIAC Reverse Engineering Malware (GREM)
- CompTIA Security+
Aufgaben
- Develop threat hunting hypotheses from CTI reporting
- Create and execute queries for intelligence-aligned TTPs
- Analyze endpoint, identity, network, and cloud telemetry
- Correlate large data sets
- Identify malicious, suspicious, and anomalous activity
- Identify advanced adversary behaviors
- Identify emerging tradecraft
- Identify potential detection gaps
- Analyze anomalies against established baselines
- Perform triage and deeper analysis on suspicious findings
- Support hunts focused on MITRE ATT&CK techniques
- Collaborate with CTI, IR, and Engineering teams
- Operationalize validated hunt queries with Detection Engineering
- Translate intelligence into actionable hunts
- Develop new behavioral detections
- Support Incident Response with telemetry and findings
- Identify misconfigurations and potential vulnerabilities
- Document hunt findings clearly and reproducibly
- Map findings to the MITRE ATT&CK framework
- Improve hunting methodologies and playbooks
Berufserfahrung
- 2 Jahre
Ausbildung
- Bachelor-Abschluss
Sprachen
- Englisch – verhandlungssicher
Tools & Technologien
- Windows
- Linux
- MacOS
- SIEM
- EDR
- IDS/IPS
- TCP/IP
- DNS
- HTTP/S
- Python
- PowerShell
- JAVA
- GO
- MITRE ATT&CK
- Lockheed’s Cyber Kill Chain
Benefits
Weiterbildungsangebote
- Constant learning
- Skill growth
Lockere Unternehmenskultur
- Culture of inclusion
Gesundheits- & Fitnessangebote
- Focus on health and well-being
Flexibles Arbeiten
- Flexible working models
Über das Unternehmen
SAP
Branche
IT
Beschreibung
SAP innovations help over four hundred thousand customers worldwide work together more efficiently and use business insight more effectively.
Noch nicht perfekt?
- SAP
(Senior) Cyber Detection Engineer(m/w/x)
Vollzeitnur vor OrtBerufserfahrenGarching bei München - SAP
Senior Cyber Detection Engineer(m/w/x)
Vollzeitnur vor OrtSeniorGarching bei München - Guldberg GmbH
Cyber Incident Responder(m/w/x)
Vollzeitnur vor OrtBerufserfahrenMünchen - Guldberg GmbH
Cyber Defence Analyst(m/w/x)
Vollzeitnur vor OrtBerufserfahrenMünchen - Accenture
Quality Assurance and Risk Analyst(m/w/x)
Vollzeitnur vor OrtManagementMünchen