Senior Cybersecurity Specialist

Caterpillar Caterpillar · Industrial · Irving, TX +2

This role focuses on proactive threat hunting, in-depth investigations using SIEM, and developing detection logic within a large-scale enterprise cybersecurity environment. It involves analyzing security telemetry, responding to incidents, and applying offensive knowledge to improve defenses.

What you'd actually do

  1. Conduct proactive threat hunting across Cloud and On‑Prem enterprise environments to identify malicious activity, anomalies, and emerging threats.
  2. Perform in‑depth investigations using SIEM technologies, leveraging strong query and analysis skills to detect adversary behaviors and indicators of compromise.
  3. Analyze authentication flows, access patterns, and system telemetry to uncover potential compromise or advanced attacker techniques.
  4. Utilize cyber threat intelligence, the MITRE ATT&CK framework, and emerging threat research to inform hunting strategies and detection engineering.
  5. Investigate and respond to high‑impact security incidents, collaborating closely with CSIRT and cross‑functional teams to contain and remediate threats.

Skills

Required

  • Threat hunting methodologies
  • SIEM platforms (querying, tuning)
  • Incident response
  • Cyber threat intelligence
  • MITRE ATT&CK framework
  • Cloud and on-premises security
  • Detection engineering
  • Log analysis
  • Communication skills
  • Collaboration skills

Nice to have

  • Mentoring junior analysts
  • Offensive security knowledge

What the JD emphasized

  • Extensive experience operating in a large‑scale, global enterprise cybersecurity environment with complex, distributed infrastructure.
  • Advanced threat hunting experience across hybrid environments, including cloud and on‑premises ecosystems, with a strong command of threat hunting methodologies, cyber threat intelligence, and practical application of the MITRE ATT&CK framework to drive hypothesis‑based hunts.
  • Expert‑level understanding of incident response operations, including leading investigations, containment and remediation efforts, root cause analysis, and post‑incident improvements.
  • Significant experience with enterprise‑grade SIEM platforms, including authoring complex queries, tuning detections at scale, and analyzing high‑volume, diverse telemetry sources.
  • Demonstrated experience developing, validating, tuning, and maintaining detections derived from threat hunting findings and real‑world adversary activity.