LOG IN
SIGN UP
Tech Job Finder - Find Software, Technology Sales and Product Manager Jobs.
Sign In
OR continue with e-mail and password
E-mail address
Password
Don't have an account?
Reset password
Join Tech Job Finder
OR continue with e-mail and password
E-mail address
First name
Last name
Username
Password
Confirm Password
How did you hear about us?
By signing up, you agree to our Terms & Conditions and Privacy Policy.

Cyber Threat Investigator

at Harvey Nash

Back to all Cybersecurity jobs
Harvey Nash logo
Recruitment Agencies

Cyber Threat Investigator

at Harvey Nash

JuniorNo visa sponsorshipCybersecurity

Posted 8 days ago

No clicks

Compensation
Not specified

Currency: Not specified

City
Not specified
Country
Not specified

Cyber Threat Investigator conducts proactive threat hunting and threat intelligence analysis across endpoints, identity, cloud, and network data. Investigates and supports response to high-priority security incidents using MITRE ATT&CK and real-world threat insights. Works with Vulnerability Management to prioritize vulnerabilities and assess exposure, misconfigurations, and attack paths, translating hunting results into actionable detection and response improvements. Prepares clear documentation and coordinates investigations with SOC, IT, Legal, Compliance, and other teams.

Key Responsibilities

  • Conduct proactive threat hunting and threat intelligence analysis across endpoint, identity, cloud, and network data.
  • Investigate and support response to high‑priority security incidents, using MITRE ATT&CK and real‑world threat insights.
  • Collaborate with Vulnerability Management to prioritize vulnerabilities and assess exposure, misconfigurations, and attack paths.
  • Convert intelligence and hunting results into actionable detection and response improvements.
  • Prepare clear documentation and coordinate investigations with SOC, IT, Legal, Compliance, and other teams.

Requirements

  • 2–6 years of experience in Threat Hunting, Threat Intelligence, or Incident Response.
  • Strong hands‑on knowledge of EDR tools and SIEM/log analytics.
  • Solid understanding of exploitation, exposure management, and attacker techniques.
  • Ability to work independently, think critically, and operate under pressure.
  • Strong communication skills; no people‑management responsibilities.

Education & Certifications

  • Degree in Cybersecurity/Computer Science or equivalent experience.
  • Practical experience may substitute for formal education.
  • Preferred certifications: GIAC (GCIA, GCIH, GCED, GCIR, GNFA, GCFA), OSCP/OSCE, CRTO/CRTP/CRTA, DFIR (GCFA, GNFA, CFCE, EnCE).

 

Cyber Threat Investigator

at Harvey Nash

Back to all Cybersecurity jobs
Harvey Nash logo
Recruitment Agencies

Cyber Threat Investigator

at Harvey Nash

JuniorNo visa sponsorshipCybersecurity

Posted 8 days ago

No clicks

Compensation
Not specified

Currency: Not specified

City
Not specified
Country
Not specified

Cyber Threat Investigator conducts proactive threat hunting and threat intelligence analysis across endpoints, identity, cloud, and network data. Investigates and supports response to high-priority security incidents using MITRE ATT&CK and real-world threat insights. Works with Vulnerability Management to prioritize vulnerabilities and assess exposure, misconfigurations, and attack paths, translating hunting results into actionable detection and response improvements. Prepares clear documentation and coordinates investigations with SOC, IT, Legal, Compliance, and other teams.

Key Responsibilities

  • Conduct proactive threat hunting and threat intelligence analysis across endpoint, identity, cloud, and network data.
  • Investigate and support response to high‑priority security incidents, using MITRE ATT&CK and real‑world threat insights.
  • Collaborate with Vulnerability Management to prioritize vulnerabilities and assess exposure, misconfigurations, and attack paths.
  • Convert intelligence and hunting results into actionable detection and response improvements.
  • Prepare clear documentation and coordinate investigations with SOC, IT, Legal, Compliance, and other teams.

Requirements

  • 2–6 years of experience in Threat Hunting, Threat Intelligence, or Incident Response.
  • Strong hands‑on knowledge of EDR tools and SIEM/log analytics.
  • Solid understanding of exploitation, exposure management, and attacker techniques.
  • Ability to work independently, think critically, and operate under pressure.
  • Strong communication skills; no people‑management responsibilities.

Education & Certifications

  • Degree in Cybersecurity/Computer Science or equivalent experience.
  • Practical experience may substitute for formal education.
  • Preferred certifications: GIAC (GCIA, GCIH, GCED, GCIR, GNFA, GCFA), OSCP/OSCE, CRTO/CRTP/CRTA, DFIR (GCFA, GNFA, CFCE, EnCE).