Director Of Threat Hunting | Remote US

Remote, USA Full-time
About Coalfire Coalfire is on a mission to make the world a safer place by solving our clients’ hardest cybersecurity challenges. We work at the cutting edge of technology to advise, assess, automate, and ultimately help companies navigate the ever-changing cybersecurity landscape. We are headquartered in Denver, Colorado with offices across the U.S. and U.K., and we support clients around the world. But that’s not who we are – that’s just what we do. We are thought leaders, consultants, and cybersecurity experts, but above all else, we are a team of passionate problem-solvers who are hungry to learn, grow, and make a difference. Position Summary The Director of Threat Hunting is responsible for designing, implementing, and managing the organization's customer facing proactive threat hunting program. This program will serve multiple clients across varied industry verticals and threat profiles. This individual will oversee a team of threat hunters to detect and mitigate advanced security threats before they impact the business operations of our customers. The role involves strategic planning, developing hunting methodologies, refining processes, and ensuring alignment with diverse organizational security objectives. What You'll Do - Lead and develop a high-performing threat hunting team, providing strategic direction and technical guidance. - Establish and refine the organization's threat hunting framework based on existing frameworks like the **Open Threat Hunting Framework (OTHF)** and industry best practices. - Define and drive threat hunting methodologies, ensuring structured, hypothesis-driven approaches to proactive threat detection. - Develop and oversee key performance indicators (KPIs) and metrics for measuring the effectiveness of threat hunting operations. - Collaborate with Cyber Threat Intelligence (CTI) teams to integrate intelligence-driven hunting approaches. - Oversee the identification, validation, and prioritization of hunts based on adversary tactics, techniques, and procedures (TTPs). - Ensure continuous improvement of threat detection capabilities through automation, data analytics, and security tooling enhancements. - Foster collaboration between security operations, incident response, and red/blue teams to improve detection and response capabilities. - Conduct executive-level reporting and communicate threat landscape insights to senior leadership and stakeholders. - Develop and execute a training and mentorship program to upskill threat hunters within the organization. - Ability to travel 20% What You'll Bring - Minimum **8+ years** of experience in cybersecurity, with at least **3+ years** in a leadership role. - Proven experience leading **threat hunting, threat intelligence, or security operations teams**. - Expertise in host and network forensic analysis across multiple platforms (Windows, Linux, Cloud environments). - Extensive knowledge of **MITRE ATT&CK, OWASP, NIST, ISO/IEC 27001, and cyber threat intelligence frameworks**. - Experience with **SIEM, EDR, threat intelligence platforms, and network analysis tools**. - Demonstrated experience in **developing and refining threat hunting processes**. - Familiarity with **data science and analytics techniques** used to enhance security operations. - Strong leadership and people management skills with experience leading security teams. - Deep understanding of **threat hunting methodologies, intelligence-driven hunting, and adversary TTPs**. - Excellent communication and presentation skills, with the ability to convey complex security concepts to both technical and non-technical audiences. - Strong ability to align threat hunting objectives with broader organizational security strategy. - Highly analytical mindset with problem-solving skills to drive continuous improvement. - Ability to foster a **proactive, investigative mindset** among team members. Bonus Points - Industry-recognized certifications such as **CISSP, OSCP, GCTH, GIAC (GCIH, GCFA, GNFA), or equivalent experience**. Apply tot his job
Apply Now

Similar Jobs

Incident Response Analyst - Shift 1 (M-F 6am EST - 2pm EST) - Secret Clearance Required

Remote, USA Full-time

Cybersecurity Operations & Incident Response Manager

Remote, USA Full-time

Director, Cybersecurity

Remote, USA Full-time

Security Incident Response Analyst (REMOTE)

Remote, USA Full-time

Senior Managing Director, Cybersecurity, Information Governance

Remote, USA Full-time

Director Cybersecurity

Remote, USA Full-time

[Remote] Cybersecurity Associate Director-Energy Providers

Remote, USA Full-time

Cyber Security Analyst (Incident Response)

Remote, USA Full-time

lead cybersecurity engineer, engineering operations (Remote, US)

Remote, USA Full-time

Cybersecurity Incident Response Lead

Remote, USA Full-time

**Experienced Data Entry Clerk – Administrative Support for blithequark**

Remote, USA Full-time

Experienced Customer Support Specialist – Live Chat & Email Representative for arenaflex

Remote, USA Full-time

Flight Attendant

Remote, USA Full-time

Head of Operations - Latino Media Content Studio: Driving Financial Management, Operational Efficiency, and Social Change

Remote, USA Full-time

Experienced Customer Service Representative - Delivering Exceptional Service from Home at blithequark

Remote, USA Full-time

**Experienced Data Entry Clerk / Typist – Remote Work Opportunity with arenaflex**

Remote, USA Full-time

**Experienced Customer Service Representative Agent – Work From Home Part-Time Focus Group Panelist Opportunities at blithequark**

Remote, USA Full-time

Hybrid STARBUCKS/BARISTA

Remote, USA Full-time

Experienced or Entry-Level Data Entry Specialist – Remote Opportunity for Career Growth and Development in Healthcare Industry at arenaflex

Remote, USA Full-time

Specialist/ Marketing Data Operations

Remote, USA Full-time
Back to Home