Deep understanding of adversary tradecraft, the MITRE ATT&CK framework, and modern threat landscapes Experience with SIEM, EDR, and cloud-native detection tools (e.g., CrowdStrike, Alienvault, AWS GuardDuty, Azure Defender, Elastic, etc.) Strong analytical and investigative mindset Familiarity with scripting languages (Python, PowerShell, etc.) Knowledge of network protocols, operating system internals, and log analysis Excellent written and verbal communication skills Demonstrated ability to work both independently and collaboratively Bachelor’s degree in Cybersecurity, Computer Science, or a related field (or equivalent experience) 5–8 years of experience in cybersecurity, including 3+ years focused on threat hunting, detection engineering, or incident response Relevant certifications are a plus (e.g., GCFA, GCTI, GNFA, OSCP, or equivalent)