ASM Research, An Accenture Federal Services Company · Madison, Dane County
Compensation
Plain English
You monitor alerts in a Security Operations Center. When something looks suspicious, you investigate.
Position Overview The Cyber Threat Hunter proactively protects enterprise environments from advanced cyber threats by analyzing network, endpoint, and log data to identify malicious activity that may evade conventional security controls. This role establishes normal traffic and data-flow baselines, detects anomalies, develops threat hypotheses, and investigates adversary tactics, techniques, and p…
Most people finish in 10–18 weeks from zero.
Want the full Security Operations career guide?
Salary data, day-in-life, personality match, full roadmap.