Overview
Job Details
We are seeking a seasoned Anvilogic Expert to lead advanced Al-based threat hunting and root cause analysis (RCA) initiatives across our security operations. The ideal candidate will have deep hands-on experience with Anvilogic's hunting workbench, detection engineering, and threat chain comelation, and will play a key role in improving incident detection, investigation, and response. This role is critical for elevating our SOC maturity through automated detection engineering, proactive threat hunts, and actionable RCA that minimizes security risk and response time.
Key Responsibilities:
Al-Based Threat Hunting
Leverage Anvilogic'
Develop and execute MITRE ATT & CK -aligned hypotheses, using multi-source telemetry and behavioral analytics.
Automate detection generation and tune logic to increase signal fidelity and reduce false positives
Root Cause Analysis (RCA)
Conduct in-depth RCA of complex incidents by correlating alert timelines, threat chains, and telemetry signals within Anvilogic's
Present RCA findings clearly to technical and non-technical stakeholders.
Contribute to the development of detection improvement loops based on RCA feedback.
Detection Engineering & Content Development
Create and maintain custom detection logic, hunt queries, and response playbooks using Anvilogic's AI- Assisted tools.
Collaborate with internal security teams to develop thewet narratives and detection packs aligned with business risk.
Contribute to Anvilogic content lifecycle tasting, publishing, and tuning of detection logic
Security Operations Support
Monitor and triage Anvilogic alerts and correlate with real-time telemetry for deeper analysis
Provide continuous feedback to improve threat detection coverage, response accuracy, and hunting workflows
Mentor junior analysts onAnvilogic tooling and RCA methodology
Required Skills & Qualifications:
1. 3+ years of experience in security operations, threat hunting, or detection engineering
2. Familiarity with SIEM tools (eg, Splunk, Sentinel, Chronicle) and cloud telemetry (e... AWS Azure)
3. Experience with structured query languages (SPL, KQL, etc.) and security log analysis.
4. Ability to correlate multi-source data to identify attack patterns and causality.
5. Excellent written and verbal communication for presenting RCA findings and hunt outcomes.
6. Bachelor's degree in Cybersecurity, Information Security, Computer Science, or equivalent: field.
Nice to Have:
Anvilogic or MITRE ATT & CK certifications (eg, Threat Hunter, Detection Engineer).
Experience with Al/Mi-enhanced security tools or data science methods in threat detection.
Familiarity with security automation tools (SOAR), Python scripting, or YAML
Exposure to threat intelligence feeds and integrating Ti with hunt workflows.