What are the responsibilities and job description for the Cyber Threat Hunting Analyst position at Wipro Limited?
About Wipro
Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs.
We leverage our holistic portfolio of capabilities in consulting, design, engineering, operations, and emerging technologies to help clients realize their boldest ambitions and build future-ready, sustainable businesses.
A company recognized globally for its comprehensive portfolio of services, strong commitment to sustainability and good corporate citizenship, we have over 250,000 dedicated employees serving clients across 66 countries.
We deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world.
- A PROUD HISTORY OF OVER 75 YEARS
- FY22 REVENUE 10.4 BN USD
- WE’RE PRESENT IN 66 COUNTRIES
- OVER 1,400 ACTIVE GLOBAL CLIENTS
Title: Cyber Threat Hunting Analyst
Duration: Full Time
Location: Dallas TX – Onsite
What You'll Do:
- Act as a trusted advisor on advanced threat hunting operations, proactively identifying threats, insider misconduct, and anomalous behavior.
- Lead hunt missions by leveraging threat intelligence, multi-source data, and brainstorming sessions to uncover malicious activity.
- Utilize advanced threat hunting techniques and tools to detect, analyze, and respond to security threats. This includes identifying threat actor groups, analyzing command and control (C2) structures, and developing network and host-based Indicators of Compromise (IOCs) or Indicators of Attack (IOAs).
- Investigate and analyze alerts for suspicious or malicious activity across corporate environments, supporting remediation efforts.
- Develop and execute proactive threat hunting methodologies, including defining search criteria to uncover undetected threats.
- Identify and address detection gaps by collaborating with Cyber Security stakeholders to enhance security controls and processes.
- Evaluate and recommend security tools and technologies for threat analysis, impact assessment, and mitigation.
- Conduct root cause analysis, review incident lessons learned, and support compliance audits to improve security posture.
- Participate in threat hunting exercises and tabletop simulations to strengthen cyber resilience.
- Mentor team members, sharing knowledge and best practices to enhance their technical capabilities.
- Detect and respond to threats using security solutions such as SIEM, data lakes, and cloud platforms.
- Support threat response efforts and conduct ad-hoc threat hunts as needed.
- Maintain technical proficiency in Information Security controls, including endpoint, cloud, SaaS, identity, and network security.
- Demonstrate expertise in Endpoint Detection and Response (EDR) tools and techniques.
- Apply foundational knowledge of Digital Forensics and Incident Response (DFIR) processes to threat investigations.
What You'll Need:
- Bachelor’s degree in Cybersecurity, Information Technology, Computer Science or a related field; advanced degree preferred.
- Eperience in the cybersecurity industry, with demonstrated roles in SOC, Incident Response, Threat Intelligence, Malware Analysis, IDS/IPS Analysis, or related functions.
- Proven ability to independently investigate and analyze alerts for anomalous, suspicious, or malicious activity in a corporate environment and support remediation efforts.
- Experience conducting proactive threat hunts, including developing custom search criteria and identifying intrusions or potential incidents.
- Strong understanding of cyber adversarial tactics, techniques, and procedures (TTPs) related to Cyber Crime, Malware, Botnets, Hacktivism, Social Engineering, APTs, and Insider Threats.
- Proficient in Endpoint Detection and Response (EDR) tools and capabilities, with hands-on experience using CrowdStrike, Microsoft Defender, and other major vendors.
- Foundational knowledge of Digital Forensics and Incident Response (DFIR) processes.
- Experience with large dataset analysis and log analysis tools, including Securonix, Snowflake, Python, Pandas, and SQL.
- Skilled in using Regular Expressions, YARA, SIGMA rules, FQL, KQL, and at least one scripting language such as Python, PowerShell, or PERL.
- Strong understanding of cyber adversarial frameworks like MITRE ATT&CK and Lockheed Martin’s Cyber Kill Chain.
- Hands-on experience hunting for Indicators of Compromise (IOCs) in SIEM and EDR tools such as Securonix, Microsoft Defender, Microsoft Purview, Microsoft Sentinel, Palo Alto XSOAR, ThreatConnect, and Recorded Future.
- Excellent written and verbal communication skills with the ability to explain technical threat hunt objectives and findings to both technical and non-technical audiences, effectively communicating associated risks.
- Certifications such as Network , Security , CISSP, CISM, GCIH, GCFA, and/or cloud-specific certifications like AWS Cloud Practitioner, AWS Certified Security - Specialty, and Microsoft Certified: Azure Security Engineer Associate.
The potential compensation for this role is based on labor costs in local markets, as well as the job-related skills, knowledge and experience of the candidate. Expected base pay for this role ranges from [$100,000] to [$115,000]. [$100,000] to [$145,000] for California . Based on the position, the role is also eligible for Wipro’s standard benefits and additional compensation offerings, including a full range of medical and dental benefits options, disability insurance, paid time off (inclusive of sick leave), other paid and unpaid leave options as well as potential incentive or variable compensation.
Note:
Wipro is an Equal Employment Opportunity employer and makes all employment and employment-related decisions without regard to a person's race, sex, national origin, ancestry, disability, sexual orientation, or any other status protected by applicable law.
Salary : $100,000 - $145,000