Threat Hunter-L3

Publication Date:  Jan 9, 2026
Ref. No:  541478
Location: 

Mahape, Navi Mumbai, Maharasht, IN

About Atos Group

 

Atos Group is a global leader in digital transformation with c. 67,000 employees and annual revenue of c. €10 billion, operating in 61 countries under two brands — Atos for services and Eviden for products. European number one in cybersecurity, cloud and high performance computing, Atos Group is committed to a secure and decarbonized future and provides tailored AI-powered, end-to-end solutions for all industries. Atos Group is the brand under which Atos SE (Societas Europaea) operates. Atos SE is listed on Euronext Paris.

 

The purpose of Atos Group is to help design the future of the information space. Its expertise and services support the development of knowledge, education and research in a multicultural approach and contribute to the development of scientific and technological excellence. Across the world, the Group enables its customers and employees, and members of societies at large to live, work and develop sustainably, in a safe and secure information space.

Key Responsibilities Proactively hunt for threats across endpoints, network, cloud, and SIEM data sources. Develop and test threat hypotheses using cyber threat intel (CTI), ATT&CK framework, and past incident data. Analyze logs, events, and telemetry from SIEM, EDR, NDR, and cloud security tools. Identify patterns, anomalies, and Indicators of Attack (IOA) / Indicators of Compromise (IOC). Create threat detection use cases, rules, and dashboards in SIEM/EDR platforms. Work closely with SOC teams to improve detection coverage and reduce false positives. Conduct root-cause analysis of suspicious activity and recommend long-term fixes. Build, document, and maintain threat hunting playbooks. Stay updated with emerging threats, APT groups, TTPs, and security trends. Collaborate with Incident Response, Red Team, and Vulnerability Management teams. Required Skills & Qualifications Strong understanding of cybersecurity fundamentals, threat types, and attack techniques. Hands-on experience with SIEM tools (Splunk / QRadar / Sentinel / Chronicle / Elastic). Experience with EDR platforms (CrowdStrike, Defender, Carbon Black, SentinelOne). Good knowledge of MITRE ATT&CK, Cyber Kill Chain, and threat modeling. Ability to analyze large datasets and identify suspicious behavior. Experience creating custom detections, correlation rules, and use cases. Strong skills in log analysis (Windows, Linux, network devices, cloud logs, etc.). Scripting knowledge (Python / PowerShell) is preferred. Experience with threat intelligence platforms is an added advantage. Preferred Qualifications Relevant certifications: GCIA, GCIH, GCFA, GCTI Threat Hunting-focused certs (e.g., SANS SEC555) Experience in SOC L2/L3, DFIR, or Red Teaming roles. Knowledge of cloud security (AWS, Azure, GCP). Soft Skills Strong analytica

 

 

Here at Atos, diversity and inclusion are embedded in our DNA. Read more about our commitment to a fair work environment for all.

 

Atos is a recognized leader in its industry across Environment, Social and Governance (ESG) criteria. Find out more on our CSR commitment. 


Choose your future. Choose Atos.