Expoint – all jobs in one place
המקום בו המומחים והחברות הטובות ביותר נפגשים
Limitless High-tech career opportunities - Expoint

Dell Cyber Threat Hunter 
Malaysia, Selangor, Sepang 
452178531

09.09.2025
What you’ll achieve

As a, you will spearhead the proactive identification and mitigation of advanced threats within our digital environment. Working closely with the CSIRT Incident Response team as a senior Cyber Threat Hunter, you'll delve deep into system, application, network, cloud, and security tooling logs in search of signs of adversary activities. Your expertise in leveraging state-of-the-art tools will be instrumental in fortifying Dell Technologies against emerging threats. Moreover, you will collaborate with various internal teams, sharing crucial insights and findings, and ensuring a unified and agile response to a wide variety of cyber threats.


You will:

  • Proactively hunt for cyber threats across our systems, endpoints, applications, networks, and multi-cloud environments

  • Perform technical cyber security investigations on security incidents, root cause analysis and deep dive analysis of malicious artifacts, analyze threat intelligence, identify TTP and attack patterns

  • Utilize advanced analytical techniques to detect anomalies and patterns indicative of malicious activities ranging from opportunistic actors to advanced persistent nation-state threats

  • Effectively collaborate with numerous teams across Dell as a cyber threat hunting subject matter expert to share insights and refine our detection and response mechanisms, deliver detailed assessments based on your hunts, detection development opportunities, and provide guidance on enhancing our security posture

  • Provide expert investigative support of large scale and complex security incidents. Mentor teammates, guiding their professional development

Essential Requirements
  • 7+ years of proven expertise in cyber threat hunting or similar experience across diverse environments. Exceptional ability to conduct cyber security investigations, analyze and distill relevant findings and determine root cause

  • Proficiency in various security tools such as SIEM, EDR

  • Demonstrated experience in network, cloud, and/or host-based intrusion analysis; malware analysis and/or digital forensics skills are a plus. Knowledge of and experience with standard network logging formats, network management systems and network security monitoring systems, security information and event management, network packet analysis tools and forensic analysis tools. Strong knowledge of web technologies, networking protocols, Microsoft Windows and Linux/Unix platforms and tools with related experience in corporate infrastructures

  • Excellent written and verbal communication skills, enabling effective collaboration and presentation of complex, technical findings for a variety of audiences

Desirable Requirements

  • Deep technical knowledge of adversarial attack methods, tools, and technologies. Industry recognized certification (CISSP, CEH, SANS GREM, GCIH, GCFA or Offensive Security OSCE, etc)

  • Strong understanding of the MITRE ATT&CK knowledge base, the Cyber Kill Chain, and the Diamond Model. Self-initiative and ability to successfully manage your time to meet the various role demands with minimal oversight