The AI Job Search Engine
Cyber Threat Hunter - Mid-Level(m/w/x)
Analyzing telemetry across endpoint, identity, network, and cloud to identify malicious activity for business application software. 2+ years professional experience in IR, Detection Engineering, or Threat Hunting required. Flexible working models.
Requirements
- Bachelor’s Degree in Computer Sciences, Information Technology, Cybersecurity, or comparable qualification
- 2+ years professional experience in IR, Detection Engineering, and/or Threat Hunting
- Familiarity with Windows, Linux, MacOS environments
- Experience with log analysis and security tooling (e.g., SIEM, EDR, IDS/IPS)
- Understanding of networking fundamentals (TCP/IP, DNS, HTTP/S)
- Ability to write and interpret programming languages (Python, PowerShell, JAVA, GO)
- Working knowledge of MITRE ATT&CK and Lockheed’s Cyber Kill Chain concepts
- Strong curiosity and analytical mindset
- Ability to identify patterns and correlate disparate data
- Detail-oriented approach to investigation and problem solving
- Willingness to learn and take direction
- Comfort working independently and collaboratively
- Good written and verbal communication skills
- Ability to articulate investigative findings to technical and non-technical stakeholders
- GIAC Security Operations Certified (GSOC)
- GIAC Certified Incident Handler (GCIH)
- GIAC Network Forensic Analyst (GNFA)
- GIAC Reverse Engineering Malware (GREM)
- CompTIA Security+
Tasks
- Develop threat hunting hypotheses from CTI reporting
- Create and execute queries for intelligence-aligned TTPs
- Analyze endpoint, identity, network, and cloud telemetry
- Correlate large data sets
- Identify malicious, suspicious, and anomalous activity
- Identify advanced adversary behaviors
- Identify emerging tradecraft
- Identify potential detection gaps
- Analyze anomalies against established baselines
- Perform triage and deeper analysis on suspicious findings
- Support hunts focused on MITRE ATT&CK techniques
- Collaborate with CTI, IR, and Engineering teams
- Operationalize validated hunt queries with Detection Engineering
- Translate intelligence into actionable hunts
- Develop new behavioral detections
- Support Incident Response with telemetry and findings
- Identify misconfigurations and potential vulnerabilities
- Document hunt findings clearly and reproducibly
- Map findings to the MITRE ATT&CK framework
- Improve hunting methodologies and playbooks
Work Experience
- 2 years
Education
- Bachelor's degree
Languages
- English – Business Fluent
Tools & Technologies
- Windows
- Linux
- MacOS
- SIEM
- EDR
- IDS/IPS
- TCP/IP
- DNS
- HTTP/S
- Python
- PowerShell
- JAVA
- GO
- MITRE ATT&CK
- Lockheed’s Cyber Kill Chain
Benefits
Learning & Development
- Constant learning
- Skill growth
Informal Culture
- Culture of inclusion
Healthcare & Fitness
- Focus on health and well-being
Flexible Working
- Flexible working models
Not a perfect match?
- SAPFull-timeOn-siteExperiencedGarching bei München
- SAP
Senior Cyber Detection Engineer(m/w/x)
Full-timeOn-siteSeniorGarching bei München - Guldberg GmbH
Cyber Incident Responder(m/w/x)
Full-timeOn-siteExperiencedMünchen - Guldberg GmbH
Cyber Incident Responder(m/w/x)
Full-timeOn-siteNot specifiedMünchen - Guldberg GmbH
Cyber Defence Analyst(m/w/x)
Full-timeOn-siteExperiencedMünchen
Cyber Threat Hunter - Mid-Level(m/w/x)
Analyzing telemetry across endpoint, identity, network, and cloud to identify malicious activity for business application software. 2+ years professional experience in IR, Detection Engineering, or Threat Hunting required. Flexible working models.
Requirements
- Bachelor’s Degree in Computer Sciences, Information Technology, Cybersecurity, or comparable qualification
- 2+ years professional experience in IR, Detection Engineering, and/or Threat Hunting
- Familiarity with Windows, Linux, MacOS environments
- Experience with log analysis and security tooling (e.g., SIEM, EDR, IDS/IPS)
- Understanding of networking fundamentals (TCP/IP, DNS, HTTP/S)
- Ability to write and interpret programming languages (Python, PowerShell, JAVA, GO)
- Working knowledge of MITRE ATT&CK and Lockheed’s Cyber Kill Chain concepts
- Strong curiosity and analytical mindset
- Ability to identify patterns and correlate disparate data
- Detail-oriented approach to investigation and problem solving
- Willingness to learn and take direction
- Comfort working independently and collaboratively
- Good written and verbal communication skills
- Ability to articulate investigative findings to technical and non-technical stakeholders
- GIAC Security Operations Certified (GSOC)
- GIAC Certified Incident Handler (GCIH)
- GIAC Network Forensic Analyst (GNFA)
- GIAC Reverse Engineering Malware (GREM)
- CompTIA Security+
Tasks
- Develop threat hunting hypotheses from CTI reporting
- Create and execute queries for intelligence-aligned TTPs
- Analyze endpoint, identity, network, and cloud telemetry
- Correlate large data sets
- Identify malicious, suspicious, and anomalous activity
- Identify advanced adversary behaviors
- Identify emerging tradecraft
- Identify potential detection gaps
- Analyze anomalies against established baselines
- Perform triage and deeper analysis on suspicious findings
- Support hunts focused on MITRE ATT&CK techniques
- Collaborate with CTI, IR, and Engineering teams
- Operationalize validated hunt queries with Detection Engineering
- Translate intelligence into actionable hunts
- Develop new behavioral detections
- Support Incident Response with telemetry and findings
- Identify misconfigurations and potential vulnerabilities
- Document hunt findings clearly and reproducibly
- Map findings to the MITRE ATT&CK framework
- Improve hunting methodologies and playbooks
Work Experience
- 2 years
Education
- Bachelor's degree
Languages
- English – Business Fluent
Tools & Technologies
- Windows
- Linux
- MacOS
- SIEM
- EDR
- IDS/IPS
- TCP/IP
- DNS
- HTTP/S
- Python
- PowerShell
- JAVA
- GO
- MITRE ATT&CK
- Lockheed’s Cyber Kill Chain
Benefits
Learning & Development
- Constant learning
- Skill growth
Informal Culture
- Culture of inclusion
Healthcare & Fitness
- Focus on health and well-being
Flexible Working
- Flexible working models
About the Company
SAP
Industry
IT
Description
SAP innovations help over four hundred thousand customers worldwide work together more efficiently and use business insight more effectively.
Not a perfect match?
- SAP
(Senior) Cyber Detection Engineer(m/w/x)
Full-timeOn-siteExperiencedGarching bei München - SAP
Senior Cyber Detection Engineer(m/w/x)
Full-timeOn-siteSeniorGarching bei München - Guldberg GmbH
Cyber Incident Responder(m/w/x)
Full-timeOn-siteExperiencedMünchen - Guldberg GmbH
Cyber Incident Responder(m/w/x)
Full-timeOn-siteNot specifiedMünchen - Guldberg GmbH
Cyber Defence Analyst(m/w/x)
Full-timeOn-siteExperiencedMünchen