Responsibilities
- Leverage deep, hands-on expertise in threat hunting, incident response, and security operations to proactively hunt, detect, defend, and advise for managed threat hunting customers
- Serve as a trusted security advisor to customers by writing and delivering tailored threat hunt findings, executive presentations, and strategic recommendations to a range of stakeholders from SOC analysts to CISOs
- Analyze customer web proxy telemetry against modern adversary Tactics, Techniques, and Procedures (TTPs) by utilizing SIEM-like tools (e.g. Splunk, Microsoft Sentinel, ElasticSearch) and by writing code (e.g. Python and SQL) to implement high-fidelity detection logic and actionable hunt hypotheses
- Review the output of detection engineering systems and the work of other analysts to continually improve our customer facing deliverables
Work Arrangement
Remote (Country)
Team
Structure: Part of the Zscaler Threat Hunting team, customer-facing role. Reports to: Director of Threat Hunting
Additional Information
- Role is remote in Costa Rica
- Reports to the Director of Threat Hunting
- Customer-facing role with occasional on-call duties
- Standard business working hours
- Position is part of the Zscaler Threat Hunting team