Taking identity security where it has never gone before.
Silverfort Logo

Silverfort

Threat Hunting & Incident Response Analyst – Identity

Posted 3 Days Ago
Remote
Hiring Remotely in United States
Mid level
Remote
Hiring Remotely in United States
Mid level
The Threat Hunting & Incident Response Analyst specializes in detecting, investigating identity-based threats and supporting incident response efforts across hybrid environments, utilizing advanced analytics and telemetry.
The summary above was generated by AI
Description

Silverfort is a cyber-security startup that develops a revolutionary identity protection platform. Using patented technology, our product enables strong authentication across entire corporate networks and cloud environments, without any modifications to endpoints and servers. In addition, we use advanced behavior analytics to apply adaptive authentication policies and prevent cyber-attacks in real time.

Our mission is to provide industry-leading unified identity protection solutions for hybrid and multi-cloud environments. We develop cutting-edge cybersecurity technology that solves urgent customer needs today and is also a game changer for years to come.

Silverfort’s team includes exceptional researchers, engineers, and technology experts who successfully tackle some of the most complex challenges in cyber-security. Silverfort has happy customers worldwide, strong market validation (including several industry awards), strategic partnerships with the largest security vendors in the world, and significant funding from leading VCs.

We’re looking for a talented Threat Hunting & Incident Response Analyst to join our growing Identity Threat Hunting and Response Team. This role offers a unique opportunity to specialize in detecting, investigating, and simulating identity-based threats—where traditional security tools often fall short.

While most threat hunters focus on endpoints, networks, or malware, your mission will be to track adversaries through identity systems—from Active Directory and cloud IdPs to complex authentication and authorization flows across hybrid environments. You’ll support enterprise investigations, help build detection capabilities, and work with security teams around the world to secure their most critical access pathways.

This role combines hands-on investigation work with deep technical analysis. You'll leverage behavioral analytics, authentication telemetry, and large-scale identity data to detect stealthy threat campaigns. You’ll also contribute to detection logic development, attack simulation efforts, and customer-facing research.


Responsibilities

Identity Threat Hunting

  • Assist in proactive threat hunting efforts focused on identity misuse, credential abuse, and lateral movement.
  • Analyze authentication data and behavioral signals to identify abnormal or malicious activity.
  • Help validate hypotheses by working with large-scale identity telemetry using tools like SQL and Python.
  • Collaborate with senior team members to refine hunting methodologies and expand detection coverage.

Incident Response Support

  • Contribute to ongoing investigations involving identity system compromises across enterprise environments.
  • Analyze logs and telemetry from systems like AD, Azure AD, and SaaS IdPs to understand attacker behavior.
  • Support triage, containment, and remediation.
  • Assist with customer communications and technical documentation related to identity incidents.

Detection Engineering & R&D

  • Support simulations of identity-based attacks (e.g., token theft, OAuth abuse, SAML manipulation) to stress-test security controls and generate detections
  • Contribute detection logic, investigation playbooks, and forensic methodologies aligned to the MITRE ATT&CK framework
  • Work with engineering teams to enhance telemetry, automate investigations, and improve product capabilities

Technical Analysis & Reporting

  • Help analyze complex identity activity across multiple systems to support investigations and detections.
  • Prepare concise and structured technical documentation for internal teams and customer engagements.
  • Contribute to knowledge sharing by supporting development of internal tools, guides, and investigative workflows.
  • Support ongoing enhancements to investigative capabilities by contributing technical feedback and improvement ideas.

Requirements
  • 3+ years of experience in incident response, compromise assessments, and threat hunting,
  • Deep understanding of identity systems and protocols (AD, Azure AD, Okta, SAML, OAuth, Kerberos, etc.)
  • Experience with identity-focused threats and the TTPs adversaries use to exploit authentication and authorization processes
  • Strong skills in data-driven investigation using tools like SQL, Python (Pandas), and modern data platforms (e.g., Snowflake)

Strongly Preferred

  • Familiarity with tools such as SIEM, EDR, SOAR, and identity posture management platforms.
  • Experience contributing to or developing detection methodologies.
  • Exposure to detection engineering or security product development.
  • Research, blogs, or conference presentations related to identity-based threats.
  • Ability to work cross-functionally with product, engineering, and business teams.
  • Security certifications (e.g., GCIH, GCFA, Azure/AWS security) are a plus.

Top Skills

Active Directory
Azure Ad
Kerberos
Oauth
Okta
Python
SAML
Snowflake
SQL

Similar Jobs at Silverfort

16 Hours Ago
Remote
United States
Junior
Junior
Information Technology • Sales • Security • Cybersecurity • Automation
The Commercial Customer Success Manager will manage customer relationships, ensuring successful deployment, software configuration, and value realization from Silverfort's platform.
Top Skills: AWSAzureVMware
2 Days Ago
Remote
United States
Senior level
Senior level
Information Technology • Sales • Security • Cybersecurity • Automation
The Channel Account Manager will establish and grow a network of partners, manage partner relationships, and drive business growth through collaboration and strategy.
Top Skills: AuthenticationBehavior AnalyticsCybersecurityIdentity Protection
4 Days Ago
Remote
United States
Senior level
Senior level
Information Technology • Sales • Security • Cybersecurity • Automation
The Channel Account Manager drives new business by building a partner network, managing relationships, and aligning sales strategies with partners.
Top Skills: Cybersecurity TechnologyIdentity Technologies

What you need to know about the Ottawa Tech Scene

The capital city of Canada and the nation's fourth-largest urban area, Ottawa has proven a rapidly growing global tech hub. With over 1,800 tech companies, many of which are leaders in their sectors, the city's tech talent now makes up more than 13 percent of its total workforce. This growth is driven not only by the big players like UL Solutions and Dropbox, but also by a thriving startup ecosystem, as new businesses emerge to follow in the footsteps of those that came before them.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account