StoneX

Threat Hunter

Job Locations IN-Bangalore
Requisition ID 2025-13430
Category (Portal Searching)
Information Technology
Position Type (Portal Searching)
Experienced Professional

Overview

Connecting clients to markets – and talent to opportunity

With 4,300 employees and over 400,000 retail and institutional clients from more than 80 offices spread across five continents, we’re a Fortune-100, Nasdaq-listed provider, connecting clients to the global markets – focusing on innovation, human connection, and providing world-class products and services to all types of investors.

Whether you want to forge a career connecting our retail clients to potential trading opportunities, or ingrain yourself in the world of institutional investing, The StoneX Group is made up of four segments that offer endless potential for progression and growth.

Business Segment Engage in a deep variety of business-critical activities that keep our company running efficiently. From strategic marketing and financial management to human resources and operational oversight, you’ll have the opportunity to optimize processes and implement game-changing policies.

Responsibilities

Position Purpose

We are seeking a experienced Threat Hunter to join our global Security Operations Center (SOC) team.  This role is based in Bangalore and aligned to UK business hours.  As an L3- level position, the Threat Hunter will dive advanced detection, investigation, and proactive hunting across enterprise environments.  You will act as a subject matter expert within the SOC, bridging intelligence detection engineering, and incident response, while mentoring junior analysts.

Key Responsibilities

Program Leadership & Strategy
  • Conduct proactive threat hunting across endpoints, networks, and cloud environments to identify malicious activity, abnormal behaviors, and emerging attacker techniques.
  • Lead complex investigation escalated from L1/L2 SOC teams, providing expert analysis and resolution guidance.
  • Develop, test, and deploy advanced detections aligned with MITRE ATT&CK and other frameworks
  • Collaborate with Threat Intelligence teams to operationalize intel into hunting hypotheses and detection rules.
  • Perform root cause analysis and propose long-term defensive improvements
  • Create and maintain documentation, playbooks, and hunt reports to improve SOC maturity
  • Mentor and upskill L1/L2 analysts, building a knowledge-sharing culture within the SOC
  • Act as point of escalation during incidents, providing expert guidance and coordination
  • Participate in re/blue/purple team exercises and integrate lessons learned into detection strategies.

 

Qualifications

To land this role:

Qualifications

Required
  • 5-8 years of experience in SOC, incident response, or dedicated threat hunting
  • Strong expertise in EDR, SIEM, and SOAR platforms
  • Deep understanding of Windows, Linux, and Cloud internals for detection and forensics
  • Proven ability to operationalize MITRE into detection and hunting activities
  • Proficiency with scripting, querying (e.g. Python, PowerShell, KQL)
  • Excellent analytical and problem solving skills with the ability to think like an attacker
  • Stong communication skills to document finding and present results to technical and executive audiences.
Nice to have
  • Experience with threat intelligence analysis and integrating intel into hunt operations
  • Familiarity with reverse engineering malware or analyzing exploits
  • Prior mentoring or leadership experience within SOC teams

 

#LI-Hybrid #LI-SC1

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed