Overview
Join to apply for the SOC - Threat Hunter role at DXC Technology
Role Summary
The Threat Hunter is responsible for proactively identifying advanced threats that evade automated security defenses. By leveraging threat intelligence, hypothesis-driven investigation, and advanced analytical techniques, this role enhances the organization's ability to detect, understand, and respond to sophisticated cyber threats.
Key Responsibilities
- Proactive Threat Hunting — Actively and iteratively search for hidden or unknown threats that may have bypassed existing security controls
- Threat Intelligence Integration — Apply threat intelligence to guide hunting efforts and identify high-risk indicators and attack techniques
- Incident Pattern Analysis — Investigate past and ongoing incidents to detect patterns, tactics, techniques, and procedures (TTPs)
- Hypothesis Development & Testing — Formulate hypotheses based on observed behaviors and intelligence, then test them through data analysis and search queries
- Advanced Tool Utilization — Use SIEM, EDR, and other advanced tools to search for anomalies and suspicious activities across customer environments
- Cross-Team Collaboration — Work closely with SOC analysts, detection engineers, and incident responders to operationalize hunting findings
- Documentation & Reporting — Produce clear reports and discovery write-ups to communicate threat findings and recommended actions
- Continuous Improvement — Recommend improvements to threat detection and incident response processes based on insights gained through hunts
- Knowledge Sharing & Training — Train and mentor SOC team members on threat hunting techniques and emerging threat trends
- Ongoing Learning — Stay current with cybersecurity threat landscape, attacker tradecraft, and evolving threat hunting methodologies
Key Tasks & Duties
Develop and refine search queries and detection logic in monitoring platforms using intelligence-driven hypothesesIdentify anomalies and outliers in event data and coordinate with detection engineers to translate findings into actionable detectionsSupport incident investigation efforts through coordination with clients and content managers for deeper, on-site investigations if neededProvide expert threat impact analysis based on observed adversary behaviors and campaign indicatorsRequired Skills & Qualifications
Strong investigative mindset with systems and design thinking capabilitiesExcellent analytical and writing skills for clear documentation and reportingPractical knowledge of threat-informed defense frameworks such as MITRE ATT&CKExperience in hypothesis development and threat modeling methodologiesFamiliarity with log analysis, endpoint telemetry, and network traffic dataPreferred Certifications (Nice To Have)
GIAC GREM – Reverse Engineering MalwareMAD20 – Threat Hunting SpecialistAbout DXC Security Team
Learn more about DXC's Security team - Security
Recruitment fraud notice : DXC does not make offers of employment via social media networks and never asks for money or payments from applicants at any point in the recruitment process. More information on employment scams is available here.
Location & Employment Details
Location : Kuala Lumpur, Federal Territory of Kuala Lumpur, MalaysiaEmployment type : Full-timeJob function : General Business, Management, and Business DevelopmentIndustries : IT Services and IT Consulting#J-18808-Ljbffr