
Associate Threat Hunter - Cyber Fusion
CyderesPosted 6/4/2025

Associate Threat Hunter - Cyber Fusion
Cyderes
Job Location
Job Summary
Cyderes is seeking an Associate Threat Hunter to join their Cyber Fusion team. As a threat hunter, you will use advanced network and host-based tools to detect and respond to threats that evade traditional security solutions. You will work independently and take ownership of projects and initiatives, analyzing audit logs and identifying suspicious activity. The ideal candidate has demonstrated experience in cybersecurity incident discovery, IPS/IDS, firewalls, content filtering technology, DLP, configuration management, monitoring, end-point protection, database security, log collection, and analysis. Strong knowledge of security-relevant data, including network protocols, ports, and common services, is also required. Cyderes values innovation, passion, and curiosity, and offers flexible remote work options, $4,000/year travel stipends, and equity in a fast-growing company.
Job Description
Responsibilities:
- Proactively “hunt” for potential malicious activity and incidents across multiple customers using advanced threat network and host-based tools
- Use both internal and external threat intelligence to build indicators of compromise into the Cyderes Threat Intelligence Platform
- Provide support in the detection, response, mitigation, and reporting of cyber threats affecting client networks with the ability to evaluate IT environments and identify security goals, objectives and requirements
- Maintain and employ a strong understanding of advanced threats, response and mitigation strategies used in Cybersecurity operations
- Analysis of audit logs with a strong ability to perform in-depth analysis to effectively identify suspicious activity
- Provide written and verbal reports and updates to customers
Requirements:
- Demonstrated and proven experience in Cybersecurity Incident Discovery and event management, IPS/IDS, Firewalls, Content Filtering Technology, DLP, Configuration Management and Monitoring, End-Point Protection, Database Security and Log Collection and Analysis.
- Strong working knowledge of security-relevant data, including network protocols, ports and common services, such as TCP/IP network protocols and application layer protocols (e.g. HTTP/S, DNS, FTP, SMTP, Active Directory etc.)
- Strong understanding of malware, its delivery mechanisms and behaviours.
- Ability to work independently and take ownership of projects and initiatives
- B.A. or B.S. from a four-year accredited university or relevant security related experience
- 3+ years relevant work experience in IT Security, regulatory compliance, risk management, incident response or network security with strong knowledge working as part of a SOC team
- Understanding of tactics, techniques, and procedures employed by threat adversaries
- Strong analytical and critical thinking skills
- Strong verbal and written skills