Cyber Security Engineer

Application ends: June 30, 2026
Apply Now

Job Description


As a Cybersecurity Engineer you’ll oversee incident response, vulnerability management, and cyber threat hunting. You’ll execute security solutions applying cutting-edge technologies like firewalls, intrusion detection and prevention systems, antivirus software, and vulnerability scanners.

Your expertise is not just welcome here its celebrated and valued. Join us as a Cybersecurity Engineer, and together well fortify our cyber defenses making the world a safer place in the digital age.Your Future at Kyndryl

When you join Kyndryl, you’re not just joining a company you’re entering a space of opportunities. Our partnerships with industry alliances and vendors mean you’ll have access to skilling and certification programs needed to excel in Security & Resiliency, while simultaneously supporting your personal growth.

Whether you envision your career path as a technical leader within cybersecurity or transition into other technical, consulting, or go-to-market roles were invested in your journey.

Qualification

Who You AreYoure good at what you do and possess the required experience to prove it. However, equally as important you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused someone who prioritizes customer success in their work. And finally, youre open and borderless naturally inclusive in how you work with others.

Required Skills and Experience :

– Having 6+years of Experience in DFI/Threat Hunter Lead the development of threat hunting hypotheses using threat intelligence, MITRE ATT&CK, and kill chain models

– Guide the team in conducting hunts across SIEM, EDR/XDR, and network telemetry to uncover hidden threats

– Validate and refine threat intelligence to ensure it is actionable and relevant

– Translate hunting outcomes into detection logic and use cases for SIEM and SOAR platforms

– Collaborate with content developers to build and tune correlation rules and analytics

– Identify gaps in visibility and recommend improvements to logging and telemetry coverage

– Escalate confirmed findings to L3 incident response teams with detailed evidence and RCA

– Recommend preventive and detective countermeasures (e.g., policy changes, new rules)

– Support RCA documentation and post-incident reviews

– Perform forensic acquisition and analysis of endpoints, servers, and cloud workloads involved in security incidents

– Extract and preserve digital evidence in accordance with legal and compliance standards.

Preferred Skills and Experience :

– Conduct timeline analysis, memory forensics, and disk image reviews to reconstruct attacker activity

– Deliver weekly/monthly reports on threat hunting activities, findings, and trends

– Participate in governance forums and contribute to executive dashboards

– Ensure alignment with SLA/KPI metrics and compliance requirements

– Mentor junior threat hunters and analysts on hypothesis building, investigation techniques, and tool usage

– Conduct knowledge-sharing sessions and contribute to skills development plans

– Coordinate with CTI, SOC, and engineering teams to align hunting with broader security goals

Tools :

– Threat hunting hypotheses using threat intelligence, MITRE ATT&CK, and kill chain models.

– Understanding of MS Sentinel , Logic Apps , Crowdstrik, Netskope, Forcepoint (Understanding of SIEM SOAR EDR DLP etc as technology solution)

Are you interested in this position?

Apply by clicking on the “Apply Now” button below!

#GraphicDesignJobsOnline

#WebDesignRemoteJobs #FreelanceGraphicDesigner #WorkFromHomeDesignJobs #OnlineWebDesignWork #RemoteDesignOpportunities #HireGraphicDesigners #DigitalDesignCareers# Dynamicbrand guru