Director Of Threat Hunting | Remote US

Remote Full-time
About Coalfire Coalfire is on a mission to make the world a safer place by solving our clients’ hardest cybersecurity challenges. We work at the cutting edge of technology to advise, assess, automate, and ultimately help companies navigate the ever-changing cybersecurity landscape. We are headquartered in Denver, Colorado with offices across the U.S. and U.K., and we support clients around the world. But that’s not who we are – that’s just what we do. We are thought leaders, consultants, and cybersecurity experts, but above all else, we are a team of passionate problem-solvers who are hungry to learn, grow, and make a difference. Position Summary The Director of Threat Hunting is responsible for designing, implementing, and managing the organization's customer facing proactive threat hunting program. This program will serve multiple clients across varied industry verticals and threat profiles. This individual will oversee a team of threat hunters to detect and mitigate advanced security threats before they impact the business operations of our customers. The role involves strategic planning, developing hunting methodologies, refining processes, and ensuring alignment with diverse organizational security objectives. What You'll Do - Lead and develop a high-performing threat hunting team, providing strategic direction and technical guidance. - Establish and refine the organization's threat hunting framework based on existing frameworks like the **Open Threat Hunting Framework (OTHF)** and industry best practices. - Define and drive threat hunting methodologies, ensuring structured, hypothesis-driven approaches to proactive threat detection. - Develop and oversee key performance indicators (KPIs) and metrics for measuring the effectiveness of threat hunting operations. - Collaborate with Cyber Threat Intelligence (CTI) teams to integrate intelligence-driven hunting approaches. - Oversee the identification, validation, and prioritization of hunts based on adversary tactics, techniques, and procedures (TTPs). - Ensure continuous improvement of threat detection capabilities through automation, data analytics, and security tooling enhancements. - Foster collaboration between security operations, incident response, and red/blue teams to improve detection and response capabilities. - Conduct executive-level reporting and communicate threat landscape insights to senior leadership and stakeholders. - Develop and execute a training and mentorship program to upskill threat hunters within the organization. - Ability to travel 20% What You'll Bring - Minimum **8+ years** of experience in cybersecurity, with at least **3+ years** in a leadership role. - Proven experience leading **threat hunting, threat intelligence, or security operations teams**. - Expertise in host and network forensic analysis across multiple platforms (Windows, Linux, Cloud environments). - Extensive knowledge of **MITRE ATT&CK, OWASP, NIST, ISO/IEC 27001, and cyber threat intelligence frameworks**. - Experience with **SIEM, EDR, threat intelligence platforms, and network analysis tools**. - Demonstrated experience in **developing and refining threat hunting processes**. - Familiarity with **data science and analytics techniques** used to enhance security operations. - Strong leadership and people management skills with experience leading security teams. - Deep understanding of **threat hunting methodologies, intelligence-driven hunting, and adversary TTPs**. - Excellent communication and presentation skills, with the ability to convey complex security concepts to both technical and non-technical audiences. - Strong ability to align threat hunting objectives with broader organizational security strategy. - Highly analytical mindset with problem-solving skills to drive continuous improvement. - Ability to foster a **proactive, investigative mindset** among team members. Bonus Points - Industry-recognized certifications such as **CISSP, OSCP, GCTH, GIAC (GCIH, GCFA, GNFA), or equivalent experience**. Apply tot his job
Apply Now →

Similar Jobs

Incident Response Analyst - Shift 1 (M-F 6am EST - 2pm EST) - Secret Clearance Required

Remote Full-time

Cybersecurity Operations & Incident Response Manager

Remote Full-time

Director, Cybersecurity

Remote Full-time

Security Incident Response Analyst (REMOTE)

Remote Full-time

Senior Managing Director, Cybersecurity, Information Governance

Remote Full-time

Director Cybersecurity

Remote Full-time

[Remote] Cybersecurity Associate Director-Energy Providers

Remote Full-time

Cyber Security Analyst (Incident Response)

Remote Full-time

lead cybersecurity engineer, engineering operations (Remote, US)

Remote Full-time

Cybersecurity Incident Response Lead

Remote Full-time

Experienced Full Stack Customer Service Representative – Remote Customer Support and Relations at Blithequark

Remote Full-time

Experienced Customer Service Representative for Hybrid Work Environment – Delivering Exceptional Customer Experiences through Effective Communication and Problem-Solving

Remote Full-time

Experienced Senior Program Manager - Customer Returns Experience and Remote Customer Service Specialist for Blithequark

Remote Full-time

Travel Mammography Tech - Weekly Pay

Remote Full-time

Exercise Physiologist job at UC Health in Longmont, CO

Remote Full-time

Experienced Customer Support Representative – Remote Work Opportunity in the Aviation Industry with blithequark

Remote Full-time

**Experienced High School English or History Teacher – Inspiring Minds and Fostering Growth in a Dynamic Remote Learning Environment**

Remote Full-time

Senior Conflicts Analyst

Remote Full-time

Experienced Cybersecurity Analyst – Part Time Remote Opportunity for Career Growth and Development in a Dynamic Industry

Remote Full-time

Senior Risk Consultant - Operational Risk

Remote Full-time
← Back to Home