Staff Cyber Threat Hunter

Adobe Adobe · Enterprise · San Jose, CA +2

Staff Cyber Threat Hunter at Adobe will lead proactive threat hunting campaigns using data-driven techniques, including ML-based methods, to identify advanced adversary activity. The role involves operationalizing results into durable detections, building automation tools with Python and APIs, and collaborating with various security teams. The candidate should have staff-level expertise, deep hunting experience in modern environments, and a continuous learning mindset regarding evolving threats and AI-enabled systems.

What you'd actually do

  1. Lead hunt campaigns: threat model, scope, implement, and complete high-complexity hunting campaigns informed by threat intelligence and business risk. Document hunting approach, research, and outcomes with actionable insights for long-term knowledge retention.
  2. Apply data-driven techniques: leverage statistical and ML-based hunting methods to analyze large datasets, identify anomalies, and surface weak signals at scale.
  3. Operationalize results: partner with Detection Engineering to convert hunt findings into durable detections, analytics, and improved instrumentation.
  4. Build automation: develop simple tools and automated solutions to fast-track hunting and investigation workflows through Python, APIs, and up-to-date development methods.
  5. Collaborate broadly: work closely with CSIRT, Threat Intelligence, Red Team, Security Engineering, and product teams to create multi-functional security impact.

Skills

Required

  • Demonstrable ability to operate independently in unstructured problem spaces and lead complex technical investigations.
  • Strong background investigating modern environments (cloud, Kubernetes, endpoints, CI/CD, identity, networking) and applying adversary TTP knowledge.
  • Advanced proficiency with SIEM and data platform query languages such as SPL, SQL, KQL, or equivalent.
  • Understanding of ML and statistical concepts (e.g., anomaly detection, baselining) and how to apply them in threat hunting.
  • Experience building automation and workflow improvements using Python, APIs, Git, and CI/CD pipelines.
  • Over 10 years in cybersecurity specializing in detection and response.

Nice to have

  • Passion for cybersecurity
  • Continuous learner
  • AI-enabled systems and emerging AI-related threats

What the JD emphasized

  • Staff-level expertise
  • Deep hunting experience
  • Over 10 years in cybersecurity specializing in detection and response