Overview
Skills
Job Details
SOC / Threat Hunter -
Experience criteria:
6+years in SOC
9+years in Cybersecurity
Applicants must have experience in atleast 2 of the technologies:
Splunk
Google Secops
PaloAlto XSIAM
Microsoft Sentinel
SentinelOne
Required Skills
- Fluency in running queries in SQL/KQL/UDM
- Should be well versed in Cybersecurity framework like MITRE ATT&CK and Cyber kill chain
- Rule creation in SIEM
- Well versed in understanding Yara and Sigma rules
- Should have experience with regex
- Scripting knowledge of python and powershell
- Experience in unstructured and structured threat hunting
- Experience in cyber security Incident response
Disclaimer
HCL is an equal opportunity employer, committed to providing equal employment opportunities to all applicants and employees regardless of race, religion, sex, color, age, national origin, pregnancy, sexual orientation, physical disability or genetic information, military or veteran status, or any other protected classification, in accordance with federal, state, and/or local law. Should any applicant have concerns about discrimination in the hiring process, they should provide a detailed report of those concerns to for investigation.
Compensation and Benefits
A candidate s pay within the range will depend on their work location, skills, experience, education, and other factors permitted by law. This role may also be eligible for performance-based bonuses subject to company policies. In addition, this role is eligible for the following benefits subject to company policies: medical, dental, vision, pharmacy, life, accidental death & dismemberment, and disability insurance; employee assistance program; 401(k) retirement plan; 10 days of paid time off per year (some positions are eligible for need-based leave with no designated number of leave days per year); and 10 paid holidays per year.