Who Can Apply
- Candidates must be legally authorized to work in Canada
Job Description
Senior Security Analyst - Threat Hunter
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.
Required Skills & Experience
Threat Hunting & Security Operations Experience
• 8+ years of experience in Security Operations, with hands on experience in threat hunting, SOC analysis, or incident response
• Demonstrated experience conducting proactive threat hunts across endpoint, identity, network, cloud, and application telemetry
• Strong understanding of adversary behaviors, tactics, and techniques, and how they manifest in enterprise environments
Threat Intelligence & Hunting Integration
• Experience consuming and operationalizing actionable threat intelligence to drive hypothesis based threat hunts
• Ability to collaborate closely with Threat Intelligence, Incident Response, and SOC teams to ensure findings translate into detections, response actions, and defensive improvements
• Experience validating intelligence through data driven investigation rather than alert only workflows
Detection & Investigation Skills
• Strong analytical skills with experience investigating complex or low signal security events
• Familiarity with detection logic aligned to frameworks such as MITRE ATT&CK
• Ability to identify gaps in existing detections and recommend improvements based on hunt outcomes
Security Tooling & Data Analysis
• Hands on experience querying and analyzing telemetry from security tools such as SIEM, EDR, and logging platforms.
• Experience and understanding of KQL, Microsoft Sentinel, Microsoft Defender, AWS, Azure
• Ability to work directly with large datasets and telemetry to uncover anomalous or malicious activity
• Experience contributing to or refining runbooks, playbooks, and investigation workflows
Operationalization & Reporting
• Experience documenting threat hunt hypotheses, methodologies, findings, and outcomes
• Ability to build and maintain metrics and reporting that communicate hunt value, trends, and risk to stakeholders
• Comfortable transitioning validated findings into detections, response actions, or strategic improvements
Communication & Collaboration
• Strong written and verbal communication skills, with the ability to explain technical findings to both technical and non technical audiences
• Proven ability to collaborate across Security Operations functions and influence improvements without direct authority
Benefit packages for this role will start on the 1st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401k retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid time off as provided by applicable law.