Job Title:
Threat Hunter - SOC
Company: Network Intelligence
Location: Mumbai, Maharashtra
Created: 2026-01-16
Job Type: Full Time
Job Description:
Threat Hunter – SOCRole OverviewA Threat Hunter in the SOC proactively searches for advanced threats, suspicious activities, and hidden attack patterns that may bypass traditional security controls. The role focuses on identifying, analyzing, and mitigating potential cyber threats before they cause damage.Key ResponsibilitiesProactively hunt for threats across networks, endpoints, servers, and cloud environmentsAnalyze logs, alerts, and telemetry from SIEM, EDR, NDR, and other security toolsIdentify Indicators of Compromise (IOCs) and Indicators of Attack (IOAs)Conduct hypothesis-driven threat hunting and behavioral analysisInvestigate advanced persistent threats (APTs), insider threats, and zero-day attacksCollaborate with SOC Analysts, Incident Response, and Blue Team for remediationDevelop and improve detection rules, use cases, and playbooksDocument findings and provide threat intelligence reportsStay updated with emerging threats, attacker TTPs, and MITRE ATT&CK techniquesRequired SkillsStrong understanding of networking, operating systems (Windows/Linux), and security conceptsHands-on experience with SIEM tools (Splunk, QRadar, Sentinel, etc.)Experience with EDR/XDR solutions (CrowdStrike, Defender, Carbon Black, etc.)Knowledge of MITRE ATT&CK frameworkLog analysis and threat intelligence correlationScripting skills (Python, PowerShell, Bash – preferred)Incident response and malware analysis basicsPreferred Qualifications2–6 years of experience in SOC, Blue Team, or Threat HuntingCertifications such as GCED, GCIA, GCIH, CEH, or similarExperience with cloud security (AWS, Azure, GCP)Familiarity with SOAR tools and automation