Threat Hunter
Cybersecurity•Full Time•4+ years•Bangalore Rural, Karnataka•
Required Skills11 skills
threat intel
MITRE ATT&CK
SIEM
EDR
KQL
Sigma
SPL
Python
PowerShell
Azure
AWS
Job Description
Do you have a passion for uncovering hidden threats and analyzing attacker behavior at a deeper level ? HGS is looking for a seasoned Threat Hunter to join our Threat Detection Team. Were seeking more than just an alert responder - we need a proactive hunter who can think like an adversary, formulate hypotheses, and develop advanced detection strategies to stay ahead of evolving threats. Key Responsibilities: Conduct proactive, hypothesis-based threat hunts across endpoint, network, identity, and cloud telemetry. Leverage threat intel (IOCs, TTPs, adversary profiles) and MITRE ATT&CK to develop hunt scenarios. Identify behavioral anomalies and previously undetected malicious activity. Build and maintain hunting playbooks, techniques, and detection logic (e.g., Sigma, KQL). Work closely with SOC , incident response, and security engineering teams. Perform root cause analysis and document findings in detailed threat hunting reports. Continuously tune hunting queries, refine hypotheses, and improve detection coverage. Contribute to purple teaming exercises and threat simulation activities.Do you have a passion for uncovering hidden threats and analyzing attacker behavior at a deeper level ?
HGS is looking for a seasoned Threat Hunter to join our Threat Detection Team.
Were seeking more than just an alert responder - we need a proactive hunter who can think like an adversary, formulate hypotheses, and develop advanced detection strategies to stay ahead of evolving threats.
Key Responsibilities:
Conduct proactive, hypothesis-based threat hunts across endpoint, network, identity, and cloud telemetry.
Leverage threat intel (IOCs, TTPs, adversary profiles) and MITRE ATT&CK to develop hunt scenarios.
Identify behavioral anomalies and previously undetected malicious activity.
Build and maintain hunting playbooks, techniques, and detection logic (e.g., Sigma, KQL).
Work closely with SOC , incident response, and security engineering teams.
Perform root cause analysis and document findings in detailed threat hunting reports.
Continuously tune hunting queries, refine hypotheses, and improve detection coverage.
Contribute to purple teaming exercises and threat simulation activities.