Director Of Threat Hunting | Remote US

Remote, USA Full-time
About Coalfire Coalfire is on a mission to make the world a safer place by solving our clients’ hardest cybersecurity challenges. We work at the cutting edge of technology to advise, assess, automate, and ultimately help companies navigate the ever-changing cybersecurity landscape. We are headquartered in Denver, Colorado with offices across the U.S. and U.K., and we support clients around the world. But that’s not who we are – that’s just what we do. We are thought leaders, consultants, and cybersecurity experts, but above all else, we are a team of passionate problem-solvers who are hungry to learn, grow, and make a difference. Position Summary The Director of Threat Hunting is responsible for designing, implementing, and managing the organization's customer facing proactive threat hunting program. This program will serve multiple clients across varied industry verticals and threat profiles. This individual will oversee a team of threat hunters to detect and mitigate advanced security threats before they impact the business operations of our customers. The role involves strategic planning, developing hunting methodologies, refining processes, and ensuring alignment with diverse organizational security objectives. What You'll Do - Lead and develop a high-performing threat hunting team, providing strategic direction and technical guidance. - Establish and refine the organization's threat hunting framework based on existing frameworks like the **Open Threat Hunting Framework (OTHF)** and industry best practices. - Define and drive threat hunting methodologies, ensuring structured, hypothesis-driven approaches to proactive threat detection. - Develop and oversee key performance indicators (KPIs) and metrics for measuring the effectiveness of threat hunting operations. - Collaborate with Cyber Threat Intelligence (CTI) teams to integrate intelligence-driven hunting approaches. - Oversee the identification, validation, and prioritization of hunts based on adversary tactics, techniques, and procedures (TTPs). - Ensure continuous improvement of threat detection capabilities through automation, data analytics, and security tooling enhancements. - Foster collaboration between security operations, incident response, and red/blue teams to improve detection and response capabilities. - Conduct executive-level reporting and communicate threat landscape insights to senior leadership and stakeholders. - Develop and execute a training and mentorship program to upskill threat hunters within the organization. - Ability to travel 20% What You'll Bring - Minimum **8+ years** of experience in cybersecurity, with at least **3+ years** in a leadership role. - Proven experience leading **threat hunting, threat intelligence, or security operations teams**. - Expertise in host and network forensic analysis across multiple platforms (Windows, Linux, Cloud environments). - Extensive knowledge of **MITRE ATT&CK, OWASP, NIST, ISO/IEC 27001, and cyber threat intelligence frameworks**. - Experience with **SIEM, EDR, threat intelligence platforms, and network analysis tools**. - Demonstrated experience in **developing and refining threat hunting processes**. - Familiarity with **data science and analytics techniques** used to enhance security operations. - Strong leadership and people management skills with experience leading security teams. - Deep understanding of **threat hunting methodologies, intelligence-driven hunting, and adversary TTPs**. - Excellent communication and presentation skills, with the ability to convey complex security concepts to both technical and non-technical audiences. - Strong ability to align threat hunting objectives with broader organizational security strategy. - Highly analytical mindset with problem-solving skills to drive continuous improvement. - Ability to foster a **proactive, investigative mindset** among team members. Bonus Points - Industry-recognized certifications such as **CISSP, OSCP, GCTH, GIAC (GCIH, GCFA, GNFA), or equivalent experience**. Apply tot his job
Apply Now

Similar Jobs

Incident Response Analyst - Shift 1 (M-F 6am EST - 2pm EST) - Secret Clearance Required

Remote, USA Full-time

Cybersecurity Operations & Incident Response Manager

Remote, USA Full-time

Director, Cybersecurity

Remote, USA Full-time

Security Incident Response Analyst (REMOTE)

Remote, USA Full-time

Senior Managing Director, Cybersecurity, Information Governance

Remote, USA Full-time

Director Cybersecurity

Remote, USA Full-time

[Remote] Cybersecurity Associate Director-Energy Providers

Remote, USA Full-time

Cyber Security Analyst (Incident Response)

Remote, USA Full-time

lead cybersecurity engineer, engineering operations (Remote, US)

Remote, USA Full-time

Cybersecurity Incident Response Lead

Remote, USA Full-time

Netflix Tagger Job (Work From Home, Remote) In Nigeria – Vacancy Global

Remote, USA Full-time

Compliance Manager; Remote from Virginia

Remote, USA Full-time

**Lead Retail Customer Service Associate – Delivering Exceptional Customer Experiences at arenaflex**

Remote, USA Full-time

[Hiring] Quality Compliance Auditor @Jobgether

Remote, USA Full-time

Amazon Data Entry Jobs No Experience Remote - Part-Time

Remote, USA Full-time

Implementation and Training Specialist

Remote, USA Full-time

Part Time Evening Work From Home Jobs - Evening Remote Support Specialist

Remote, USA Full-time

Entry-Level Remote Live Chat Operator – No Phone Calls, Flexible Scheduling, and Ongoing Training for Career Growth at blithequark

Remote, USA Full-time

Experienced Part-Time Remote Online Chat Customer Service Representative – Flexible Schedule and Comprehensive Benefits at blithequark

Remote, USA Full-time

Independent Contractor / 1099 – Referral Agent

Remote, USA Full-time
Back to Home