Minimum 10 years of progressive cybersecurity experience with increasing responsibility in threat hunting, incident response, digital forensics, cyber intelligence, or related fields. Significant experience leading and managing technical teams. Advanced expertise in security technologies (EDR, SIEM, cloud security, network security). Deep understanding of network and host-based security concepts and protocols within complex, multi-faceted enterprise networks. Extensive proven experience with threat intelligence platforms, advanced data analysis tools, and scripting/query languages (e.g., Python, SPL, SQL, LogScale). Comprehensive and strategic understanding of the cyber threat landscape (tactical, operational, strategic). Familiarity with security and analysis frameworks (MITRE ATT&CK, Kill Chain, Diamond Model, NIST Incident Response, etc.). Demonstrated advanced experience in network and host-based analysis and investigation. Exceptional analytical and problem-solving skills. Superior written and verbal communication skills, including extensive experience briefing corporate executives and diverse professional audiences. Significant demonstrated experience in leading, mentoring, and developing technical teams. Proven ability to develop, implement, and enforce standard operating procedures and complex workflows. Proven ability to envision and drive the implementation of strategic systems and technologies to support security operations. Ability to be on-call to provide strategic support and guidance during critical incidents and non-traditional hours. Highly self-motivated and able to work independently and collaboratively. Relevant advanced certifications (e.g., CISSP, CISM, SANS GIAC certifications at the expert level) are highly preferred.