Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Threat Hunter image - Rise Careers
Job details

Threat Hunter

Location: Overland Park, KS

Position Type: Full-Time (day shift)

Company Summary: TENEX.AI is an AI-native, automation-first, built-for-scale Managed Detection and Response (MDR) provider. We are a force multiplier for defenders, helping organizations enhance their cybersecurity posture through advanced threat detection, rapid response, and continuous protection. Our team is comprised of industry experts with deep experience in cybersecurity, automation, and AI-driven solutions. We’re a fast growing startup backed by industry experts and top tier investor Andreessen Horowitz. As an early employee, you’ll play a meaningful role in defining and building our culture. Get in on the ground floor. We’re a small but well-funded team that just raised a substantial round – joining now comes with limited risk and unlimited upside. We are rapidly growing and seeking top talent to join our mission of revolutionizing the cybersecurity landscape.

Job Summary: We are seeking a highly skilled and proactive Threat Hunter to join our Security Operations team. The ideal candidate will have a strong background in hypothesis-driven data analysis, including long tail and anomaly detection, cybersecurity, coupled with experience in leveraging AI and machine learning (ML) technologies, particularly in the context of Google’s SecOps platform (e.g. Google Chronicle), to enhance the detection, analysis, and response to security incidents. This role is integral to safeguarding the organization's digital infrastructure, ensuring rapid detection of threats, and supporting continuous improvement of security processes.

Key Responsibilities:

  • Threat Hunting

    • Proactively search for indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) used by threat actors.

    • Analyze and correlate security telemetry from various sources, including SIEM, EDR, network logs, and threat intelligence feeds.

    • Conduct threat modeling and hypothesis-driven investigations to uncover hidden threats.

    • Collaborate with SOC analysts and incident responders to investigate and contain security incidents.

    • Develop and refine detection rules, signatures, and threat hunting methodologies.

    • Stay ahead of emerging threats by researching new attack vectors, adversary techniques, and malware trends.

    • Provide detailed reports on findings, including mitigation strategies and recommendations.

    • Contribute to the continuous improvement of threat detection capabilities through automation and AI-driven analysis.

  • Threat Monitoring & Detection:

    • Monitor security alerts and events across the enterprise network, using both traditional cybersecurity tools and AI/ML-powered threat detection systems.

    • Leverage Google Chronicle's capabilities for threat intelligence and log analysis, enhancing visibility and providing insights into potential security incidents.

    • Apply AI to identify patterns, anomalies, and behaviors indicative of potential security incidents, reducing false positives and improving detection accuracy.

  • Incident Response & Analysis:

    • Investigate and analyze security incidents and breaches, leveraging AI to automate initial analysis and enhance threat hunting efforts.

    • Utilize Google SecOps and Chronicle’s advanced tools to centralize security data, correlate events, and accelerate incident response workflows.

    • Apply machine learning algorithms to identify emerging threats and trends, providing actionable insights for incident response.

  • Google SecOps & Chronicle Integration:

    • Work with Google SecOps platform tools to streamline security operations, improve threat visibility, and automate workflows.

    • Collaborate with IT, Security, and Data Science teams to integrate Google Chronicle’s capabilities into the SOC, enhancing threat detection and incident resolution.

    • Optimize Google Chronicle for log management, threat hunting, and advanced analytics.

  • Security Automation:

    • Develop and maintain automated workflows for common security incidents, leveraging AI for intelligent decision-making and faster response times.

    • Automate routine SOC tasks such as log analysis, incident classification, and threat intelligence enrichment using Google SecOps and Chronicle integrations.

  • Reporting & Documentation:

    • Create detailed incident reports, risk assessments, and threat intelligence summaries, integrating AI-driven findings and insights.

    • Prepare regular performance and security posture reports for internal stakeholders, highlighting key AI-driven improvements and threat mitigation outcomes.

  • Collaboration & Knowledge Sharing:

    • Work closely with cross-functional teams (e.g., IT, Customer Success, DevOps, Engineering, Data Science) to promote and improve AI-driven security initiatives and improve the customers' overall security posture.

    • Share knowledge of AI-powered security techniques and Google SecOps tools with SOC team members to enhance their capabilities in threat detection and incident response.

Qualifications:

  • Education: Bachelor’s degree in Computer Science, Information Security, or a related field, or equivalent work experience.  Relevant certifications (e.g., CISSP, CISM, CEH) are a plus.

  • Experience:

    • 3+ years of experience in a Threat Hunting, Security Operations Center (SOC) or a similar security-focused role.

    • Strong understanding of attacker methodologies, malware analysis, and digital forensics.

    • Hands-on experience with security tools such as SIEM, EDR, SOAR, and forensic analysis platforms.

    • Proficiency in scripting languages (Python, PowerShell, etc.) for automating threat detection and analysis.

    • Interest in applying automation and/or artificial intelligence and machine learning techniques to cybersecurity tasks, such as threat detection, anomaly detection, and security automation.

    • Hands-on experience with security analytics, log management, threat hunting, and incident response 

    • Hands-on experience with Google SecOps platform (Google Chronicle) is a strong plus.

    • Hands-on experience with the Microsoft security platform (Sentinel, Defender) is a plus.

  • Technical Skills:

    • Strong understanding of cybersecurity concepts and frameworks (e.g., NIST, Mitre, ISO, Killl Chain).

    • Experience with AI/ML tools for cybersecurity, such as intrusion detection systems (IDS), SIEM tools, and security automation platforms.

    • Proficiency in scripting languages (e.g., Python, PowerShell) for automation and integration.

    • Knowledge of security technologies such as firewalls, endpoint protection, IDS/IPS, and threat intelligence platforms.

    • Practical experience working with Google SecOps tools and Chronicle for centralized threat intelligence and event correlation a plus.

  • Soft Skills:

    • Strong analytical and problem-solving skills.

    • Team player, ability work with internal teams and external customers.

    • Ability to work under pressure in a fast-paced, dynamic environment.

Preferred Skills:

  • Experience with security orchestration, automation, and response (SOAR) platforms.

  • Exposure to cloud security platforms (e.g., AWS, Azure, Google Cloud) and the associated risks.

Why Join Us?

  • Opportunity to work with cutting-edge AI-driven cybersecurity technologies and Google SecOps solutions.

  • Collaborate with a talented and innovative team focused on continuously improving security operations.

  • Competitive salary and benefits package.

  • A culture of growth and development, with opportunities to expand your knowledge in AI, cybersecurity, and emerging technologies.

If you're passionate about combining cybersecurity expertise with artificial intelligence and have experience with Google SecOps and Chronicle, we encourage you to apply!

Average salary estimate

$100000 / YEARLY (est.)
min
max
$80000K
$120000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Threat Hunter, TENEX.AI

TENEX.AI, based in Overland Park, KS, is on the lookout for a proactive Threat Hunter to join our dynamic Security Operations team. As an early member of our company, you'll be involved in shaping our innovative culture, working with cutting-edge AI-driven solutions in cybersecurity. Your role will encompass hunting for threats before they become breaches, meaning you'll dive deep into hypothesis-driven data analysis and anomaly detection. You’ll utilize your expertise in Google's SecOps platform, including Google Chronicle, to provide rapid detection and response against cyber threats. Collaborating closely with SOC analysts and incident responders, you'll not only analyze security telemetry from numerous sources but also develop robust detection methodologies. We're fostering a culture that places immense value on teamwork, continuous improvement, and knowledge sharing. Your insights will help safeguard our digital infrastructure and enhance our threat detection capabilities with automation and AI. We aim to stay ahead of the cyber threat landscape, so your research on new attack vectors and adversary tactics will be invaluable. If you're excited about emboldening organizations' cybersecurity postures and being a part of a rapidly growing team that just snagged a considerable funding round from Andreessen Horowitz, then come join us at TENEX.AI and help revolutionize the cybersecurity landscape while letting your innovative spirit shine.

Frequently Asked Questions (FAQs) for Threat Hunter Role at TENEX.AI
What qualifications do I need to become a Threat Hunter at TENEX.AI?

To qualify for the Threat Hunter position at TENEX.AI, you should ideally possess a Bachelor's degree in Computer Science, Information Security, or a related field, alongside 3+ years of experience in a threat hunting or SOC-related role. Understanding attacker methodologies and having hands-on experience with security tools such as SIEM and EDR is essential. Additionally, proficiency in scripting languages like Python or PowerShell and experience working with the Google SecOps platform, including Google Chronicle, will greatly enhance your candidacy.

Join Rise to see the full answer
What are the primary responsibilities of a Threat Hunter at TENEX.AI?

As a Threat Hunter at TENEX.AI, your primary responsibilities will include proactively searching for indicators of compromise, analyzing security data from various sources, and conducting hypothesis-driven investigations. You'll collaborate with SOC analysts to investigate security incidents, develop detection rules, and monitor alerts across our enterprise network. Continuous improvement of our automation capabilities coupled with regular reporting and documentation will also be a key part of your day-to-day tasks.

Join Rise to see the full answer
How does TENEX.AI use AI in its Threat Hunter role?

At TENEX.AI, AI plays a crucial role in the Threat Hunter position by enhancing our detection capabilities and automating threat analysis. You will leverage machine learning algorithms to identify emerging threats and patterns indicative of potential security incidents, allowing you to reduce false positives. The integration of these AI-driven methodologies empowers the security team to stay one step ahead of cyber adversaries and respond quickly and effectively to incidents.

Join Rise to see the full answer
What tools and technologies will I work with as a Threat Hunter at TENEX.AI?

In your role as a Threat Hunter at TENEX.AI, you will work extensively with industry-standard security tools such as SIEM, EDR, and AI/ML platforms, particularly Google SecOps and Google Chronicle. Your experience with these technologies will help you streamline security operations, enhance threat visibility, and automate workflows for efficient incident response.

Join Rise to see the full answer
What is the importance of collaboration in the Threat Hunter position at TENEX.AI?

Collaboration is at the heart of the Threat Hunter position at TENEX.AI. You will work closely with cross-functional teams, including IT, Data Science, and Customer Success, to share knowledge and promote AI-driven security initiatives. This collaborative approach ensures that all aspects of our cybersecurity posture are rigorously enhanced, resulting in improved threat detection and response strategies.

Join Rise to see the full answer
Common Interview Questions for Threat Hunter
Can you explain your approach to threat hunting?

When discussing your approach to threat hunting, focus on your hypothesis-driven methodology. Explain how you analyze data to identify indicators of compromise and how you prioritize the threats based on potential impact. Highlight your experience with tools like Google Chronicle and how you apply AI to streamline your processes.

Join Rise to see the full answer
How do you stay updated on emerging cyber threats?

Share the resources you rely on to stay informed, such as cybersecurity blogs, threat intelligence platforms, and community forums. Mention how you participate in relevant webinars or conferences and your habit of following industry leaders on social media to gain insights on new attack vectors and methodologies.

Join Rise to see the full answer
Describe a time when you identified a major security incident. What steps did you take?

When answering this question, detail the incident’s context, your detection process, and the steps you took to investigate and contain the threat. Emphasize your collaboration with other team members and how you utilized available security tools to address the incident effectively.

Join Rise to see the full answer
What scripting languages do you use for threat detection and analysis?

If you have experience with Python, PowerShell, or other relevant scripting languages, discuss how you’ve used them to automate tasks, create detection rules, or analyze script outputs. Provide specific examples of successful implementations that showcase your capabilities.

Join Rise to see the full answer
What experience do you have with incident response?

Discuss your experience in managing incidents from initial detection through to closure. Include your involvement in incident response teams, detailing tools used and methodologies applied. Provide a specific example that highlights your skills in analyzing incidents and presenting findings.

Join Rise to see the full answer
How do you ensure your threat detection methods are effective?

To answer this effectively, explain your process for continuously refining detection methods based on the outcome of past hunts, false positive rates, and new intelligence gained from emerging threats. Highlight your use of metrics and reporting to trace effectiveness.

Join Rise to see the full answer
Can you give an example of how you've collaborated with other teams?

Provide specific examples of instances where you worked with IT, development, or data science teams. Highlight a situation where this collaboration led to a stronger security posture, perhaps through knowledge sharing, coordinated response, or developing integrated security solutions.

Join Rise to see the full answer
How do you prioritize threats during an investigation?

Explain your analytical process for assessing threats, including how you evaluate the potential impact and likelihood of exploitation. Discuss your criteria for prioritization, such as the severity of the threat and the vulnerabilities it presents, ensuring that your response is efficient and effective.

Join Rise to see the full answer
What role does automation play in your threat hunting process?

Talk about how automation enhances your efficiency in threat detection and incident response. Discuss specific tasks you automate using AI-powered tools, like log analysis or incident classification, and how it allows you to focus on more complex threats.

Join Rise to see the full answer
Why are communication skills important in the Threat Hunter role?

Illustrate why communication is critical when discussing incident findings, threat trends, and security posture improvements, not just with technical teams, but also with internal stakeholders and clients. Effective communication fosters understanding and collaboration, essential in a fast-paced cybersecurity environment.

Join Rise to see the full answer
Similar Jobs
Posted 10 days ago

TENEX.AI seeks a skilled Senior Incident Responder to join their proactive Security Operations Center and tackle complex cybersecurity challenges.

Posted 17 hours ago

As a Conversational AI Engineer at Bush & Bush Law Group, you'll revolutionize legal services through cutting-edge AI systems.

Photo of the Rise User
Posted 11 days ago
Inclusive & Diverse
Empathetic
Collaboration over Competition
Growth & Learning
Transparent & Candid
Medical Insurance
Dental Insurance
Mental Health Resources
Life insurance
Disability Insurance
Child Care stipend
Employee Resource Groups
Learning & Development

Join American Express as a Mid-Level Engineer I to lead the development of reporting and analytics solutions in a hybrid work environment.

Posted 9 days ago

As a Cloud Security Expert, you will lead the charge in protecting sensitive government information through robust cloud security measures.

Children’s Mercy is looking for a Security Engineering Manager to join a dedicated team making a positive impact on children's health.

Lead cybersecurity compliance efforts at Little Caesars as a Cybersecurity GRC Compliance Lead Engineer to make a positive impact across the organization.

Photo of the Rise User

A meticulous ServiceNow Certified System Administrator is sought to manage our platform and enhance workflows while ensuring top-level formality.

Posted 4 days ago

MLabs is looking for an experienced DevOps & Data Engineer with a compliance focus to enhance their cloud infrastructure and ensure data security.

Avera Hybrid Sioux Falls, SD
Posted 12 days ago

Join Avera Health as an Applications Analyst and contribute to creating integrated health information systems while enhancing operational efficiency.

MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
HQ LOCATION
No info
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
February 19, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
Photo of the Rise User
Someone from OH, Cincinnati just viewed M365 Technical Advisor at Upwork
Photo of the Rise User
Someone from OH, Cincinnati just viewed Sr. Client Care Support at Visa
Photo of the Rise User
Someone from OH, Cincinnati just viewed Level 1 Support Technician at Pico
Photo of the Rise User
83 people applied to Jr SOC Analyst at IBM
Photo of the Rise User
10 people applied to SOC Analyst I at CBIZ
Photo of the Rise User
Someone from OH, Steubenville just viewed Digital Marketing Content Intern at Sanction Scanner
Photo of the Rise User
Someone from OH, Cleveland just viewed Data Labeling Associate - 6 Month Contract at Citylitics
Photo of the Rise User
Someone from OH, Dublin just viewed Trainee Database Engineer - IN ( Oracle ) at Rackspace
Photo of the Rise User
13 people applied to ITSM Specialist at Datacom
C
Someone from OH, Lorain just viewed RN Ambulatory - Dermatology at CCF
Photo of the Rise User
Someone from OH, New Albany just viewed Jr Data Scientist (Hybrid) at NielsenIQ
Photo of the Rise User
7 people applied to Cybersecurity Intern at Terumo
Photo of the Rise User
Someone from OH, Lewis Center just viewed Banking Sector | PL/SQL Developer (Hybrid) at Devoteam
Photo of the Rise User
Someone from OH, Loveland just viewed Director, Change Management at Visa
Photo of the Rise User
14 people applied to IT Intern - Seasonal at Carowinds
Photo of the Rise User
Someone from OH, Columbus just viewed Manager, People Partner (Remote, US) at Renew Home
Photo of the Rise User
Someone from OH, Pleasant Hill just viewed Manager, Strategic Partnerships at Lindenwood University
Photo of the Rise User
Someone from OH, Columbus just viewed Associate Director, US HCP Marketing at Sobi
C
Someone from OH, Cincinnati just viewed Injection Molding Machine Operator at Clarios
Photo of the Rise User
Someone from OH, Columbus just viewed Senior XM Advisor - Customer Experience at Qualtrics
Photo of the Rise User
Someone from OH, Columbus just viewed Dynamics 365 Senior Functional Consultant at ARO
Photo of the Rise User
Someone from OH, Canton just viewed Consultant- Natural Resources at Esri
Photo of the Rise User
Someone from OH, Strongsville just viewed Digital Operations Specialist at Riverside Insights
Photo of the Rise User
Someone from OH, Delaware just viewed Casting: 'Séance At The Museum' at Backstage