Deep understanding of adversary tradecraft, MITRE ATT&CK framework, and modern threat landscapes Experience with SIEM, EDR, and cloud-native detection tools (e.g., CrowdStrike, Alienvault, AWS GuardDuty, Azure Defender, Elastic) Strong analytical and investigative mindset Familiarity with scripting languages (Python, PowerShell, etc.) Knowledge of network protocols, operating system internals, and log analysis Excellent written and verbal communication skills Ability to work independently and collaboratively Bachelor's degree in Cybersecurity, Computer Science, or related field (or equivalent experience) 5–8 years of experience in cybersecurity 3+ years focused on threat hunting, detection engineering, or incident response