Job Description
As a Cybersecurity Engineer you’ll oversee incident response, vulnerability management, and cyber threat hunting. You’ll execute security solutions applying cutting-edge technologies like firewalls, intrusion detection and prevention systems, antivirus software, and vulnerability scanners.
Your expertise is not just welcome here its celebrated and valued. Join us as a Cybersecurity Engineer, and together well fortify our cyber defenses making the world a safer place in the digital age.Your Future at Kyndryl
When you join Kyndryl, you’re not just joining a company you’re entering a space of opportunities. Our partnerships with industry alliances and vendors mean you’ll have access to skilling and certification programs needed to excel in Security & Resiliency, while simultaneously supporting your personal growth.
Whether you envision your career path as a technical leader within cybersecurity or transition into other technical, consulting, or go-to-market roles were invested in your journey.
Qualification
Who You AreYoure good at what you do and possess the required experience to prove it. However, equally as important you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused someone who prioritizes customer success in their work. And finally, youre open and borderless naturally inclusive in how you work with others.
Required Skills and Experience :
– Having 6+years of Experience in DFI/Threat Hunter Lead the development of threat hunting hypotheses using threat intelligence, MITRE ATT&CK, and kill chain models
– Guide the team in conducting hunts across SIEM, EDR/XDR, and network telemetry to uncover hidden threats
– Validate and refine threat intelligence to ensure it is actionable and relevant
– Translate hunting outcomes into detection logic and use cases for SIEM and SOAR platforms
– Collaborate with content developers to build and tune correlation rules and analytics
– Identify gaps in visibility and recommend improvements to logging and telemetry coverage
– Escalate confirmed findings to L3 incident response teams with detailed evidence and RCA
– Recommend preventive and detective countermeasures (e.g., policy changes, new rules)
– Support RCA documentation and post-incident reviews
– Perform forensic acquisition and analysis of endpoints, servers, and cloud workloads involved in security incidents
– Extract and preserve digital evidence in accordance with legal and compliance standards.
Preferred Skills and Experience :
– Conduct timeline analysis, memory forensics, and disk image reviews to reconstruct attacker activity
– Deliver weekly/monthly reports on threat hunting activities, findings, and trends
– Participate in governance forums and contribute to executive dashboards
– Ensure alignment with SLA/KPI metrics and compliance requirements
– Mentor junior threat hunters and analysts on hypothesis building, investigation techniques, and tool usage
– Conduct knowledge-sharing sessions and contribute to skills development plans
– Coordinate with CTI, SOC, and engineering teams to align hunting with broader security goals
Tools :
– Threat hunting hypotheses using threat intelligence, MITRE ATT&CK, and kill chain models.
– Understanding of MS Sentinel , Logic Apps , Crowdstrik, Netskope, Forcepoint (Understanding of SIEM SOAR EDR DLP etc as technology solution)
Are you interested in this position?
Apply by clicking on the “Apply Now” button below!
#GraphicDesignJobsOnline
#WebDesignRemoteJobs #FreelanceGraphicDesigner #WorkFromHomeDesignJobs #OnlineWebDesignWork #RemoteDesignOpportunities #HireGraphicDesigners #DigitalDesignCareers# Dynamicbrand guru
Apply Now