What You’ll Do
- Analyze, understand, and leverage public research on emerging cyber threats, detection methods and tools,
- Research and apply Continuous Threat Exposure Management (CTEM) methodologies by conducting thorough studies on best practices, then implement and continuously refine them to proactively identify, expose, and mitigate vulnerabilities in response to evolving threats,
- Research and develop hardening methodologies for cybersecurity defenses by analyzing best practices and frameworks,
- Deploy, configure, and manage endpoint security technologies, including XDR, EDR, SIEM, and EPP solutions, to evaluate their response to Picus Attack Scenarios,
- Design and develop both open-source and vendor-based threat detection scenarios,
- Utilize AI and data analysis techniques to create innovative cybersecurity solutions that enhance threat detection and response capabilities,
- Optimize detection rules to improve the accuracy and efficiency of threat detection, reducing false positives while enhancing the ability to identify cyber threats,
- Develop and maintain tools to support the Detection Development Life Cycle,
- Conduct research on new threat hunting methodologies, tools, and technologies to stay ahead of evolving threats,
- Onboard, configure, and maintain detection and hunting products (e.g., SIEM, EDR) to enhance security operations,
- Optimize internal SOC technologies and processes to improve threat detection and response capabilities,
- Utilize threat intelligence services and malware sandboxes to effectively hunt for and analyze emerging malware threats,
- Collaborate with Picus Labs Red Team for purple teaming exercises to improve defenses,
- Partner with engineering teams to contribute to the development and refinement of new product features.
What You Have
- Hands-on experience in hunting current adversarial techniques,
- Experience with security monitoring, incident detection, and response in enterprise environments,
- Proficiency in scripting languages (e.g., Python, Bash) for automating tasks and improving processes,
- Strong threat detection and hunting knowledge,
- Strong SIGMA and YARA rule development knowledge,
- Hands-on experience in administering and using network security, SIEM and EDR technologies,
- Knowledge of Mitre ATT&CK framework and threat intelligence services,
- Community contribution to defensive knowledge will be a plus. (Open source projects, etc.),
- A proactive mindset with a continuous learning attitude towards new security technologies and threats,
- Excellent communication skills to effectively interact with technical and non-technical teams,
- Proficiency in written English.
Top Skills
What We Do
Picus Security is the pioneer of Breach and Attack Simulation (BAS). The Picus Complete Security Control Validation Platform is trusted by leading organizations worldwide to continuously validate the effectiveness of security controls against cyber-attacks and supply actionable mitigation insights to optimize them.
Picus has offices in North America, Europe and APAC and is supported by a global network of channel and alliance partners.
The company is dedicated to helping security professionals become more threat-centric and via its Purple Academy offers free online training to share the latest offensive and defensive cybersecurity strategies.
Find more here: https://www.picussecurity.com/







