As the Threat Hunting & Intelligence Lead, you will be a senior security specialist responsible for designing, establishing, and leading an intelligence‑led threat hunting capability across the managed security service. This role combines hands‑on technical excellence, analyst development, and client‑facing leadership to deliver proactive security outcomes beyond traditional SOC alerting.
You will reshape the threat hunting programme from the ground up, defining AI enabled methodologies, telemetry requirements, and measures of success before evolving into ongoing hunting execution, coaching analysts, and acting as a trusted advisor to clients and internal stakeholders. The role blends offensive attacker‑mindset insight with deep defensive detection and response expertise, making it a key differentiator for both service delivery and pre‑sales engagements.
Key Responsibilities
* Threat Hunting Programme Development
o Design and establish a formal, repeatable threat hunting programme, including:
o Hunting methodologies and frameworks
o Hypothesis‑driven hunting models
o Tooling, data sources, and telemetry requirements
o Clear success metrics and measurable outcomes
* Define and embed how threat hunting integrates with:
o SIEM detections and detection engineering
o SOC operations and workflows
o Incident response processes
o Intelligence‑led prioritisation and use‑case development
* Ensure hunting outputs directly inform continuous service improvement.
Hands‑On Threat Hunting & Intelligence
* Conduct advanced, hands‑on threat hunts in the Microsoft Ecosystem primarily across:
o Endpoint (EDR/XDR)
o Identity and authentication telemetry
o Cloud platforms and SaaS environments
o SIEM and log‑based data sources
* Apply offensive security tradecraft (attacker TTPs, kill chains, evasion techniques) to uncover threats that bypass automated detections.
* Translate hunting and intelligence outcomes into:
o New or improved detection cases
o Automation opportunities
o SOC operational enhancements
o Detection coverage and fidelity improvements
* Maintain strong awareness of the current threat landscape, adversary behaviours, and emerging attack techniques.
Analyst Coaching & Capability Uplift
* Coach and mentor SOC analysts through collaborative hunting, developing:
o Threat‑led and adversary‑focused thinking
o Strong investigative depth and analytical reasoning
o Confidence in hypothesis‑driven analysis
* Lead hunts in a collaborative model, uplifting analyst capability rather than operating as a siloed expert.
* Embed a continuous learning culture where hunting outcomes directly improve detections, response playbooks, and analyst maturity.
* Act as a client‑facing authority for threat hunting and threat intelligence, able to:
o Explain hunting outcomes in clear, business‑relevant language
o Demonstrate how proactive hunting reduces risk beyond reactive alerting
o Articulate the value of intelligence‑led security operations
* Serve as a trusted advisor during service reviews, executive briefings, and strategic engagements.
Technical Leadership & Collaboration
* Demonstrate deep technical expertise across:
o SIEM platforms
o EDR/XDR technologies
o Cloud security platforms
o Identity and access telemetry
* Work closely with:
o Detection Engineering teams
o Platform Automation and Engineering
o SOC leadership and incident response leads
* Ensure threat hunting insights drive tangible, measurable service improvements.
Qualifications
* Core Experience & Skills
o Extensive experience in threat hunting, detection engineering, or advanced SOC operations.
o Strong understanding of adversary behaviors, attack chains, and modern threat actor tradecraft.
o Deep hands‑on experience with SIEM, EDR/XDR, cloud, and identity telemetry.
o Proven ability to design and operate hypothesis‑driven hunting programmes.
o Experience translating technical findings into business‑level risk and outcomes.
o Strong collaboration and leadership skills within multi‑disciplinary security teams.
o Confident communicator.
o MSSP background a positive.
* Relevant certifications such as (or equivalent to)
o CEH
o Offensive security or red team certifications
o Advanced detection or threat hunting credentials
#J-18808-Ljbffr