Bachelor’s degree in Cybersecurity, Computer Science, or equivalent experience. 5–8 years of experience in cybersecurity. 3+ years focused on threat hunting, detection engineering, or incident response. Deep understanding of adversary tradecraft, the MITRE ATT&CK framework, and modern threat landscapes. Experience with SIEM, EDR, and cloud-native detection tools (e.g., CrowdStrike, Alienvault, AWS GuardDuty, Azure Defender, Elastic). Familiarity with scripting languages (Python, PowerShell, etc.). Knowledge of network protocols, operating system internals, and log analysis. Excellent written and verbal communication skills.