Skip to main content

This job has expired

Senior Cyber Threat Hunter

Closing date
13 Jun 2024

View more

Technology & Digital
Full Time
Flexible working available
Contract Type

Job Details

Job Description: Senior Cyber Threat Hunter


The Pfizer Global Information Security (GIS) organization safeguards critical information assets by employing world-class talent to proactively defend company interests. Fostering a culture of colleague empowerment, we support Pfizer's mission of delivering breakthroughs that change patients' lives. GIS teams continuously work to detect threats faster, respond decisively, and make Pfizer harder to hack. GIS leadership cultivates a positive, fun, welcoming, collaborative, flexible, and supportive work environment that lifts people up and helps them realize their full potential. We achieve this through our company values of Courage, Excellence, Equity, and Joy, and a strong culture of enablement. This is a great place to work where colleagues are provided with opportunities to grow, receive acknowledgement of their achievements, and are rewarded for hard work.

The Cyber Threat Hunting (CTH) team is accountable for identifying unrealized threats that may have evaded security controls and actively improving our security posture. We use vast collections of data, a comprehensive toolset, and creative investigative techniques to identify & analyse potential threats. In collaboration with other GIS teams, we also contribute to the development and implementation new security controls and detections.

The incumbent will be a senior member of the Pfizer GIS Cyber Threat Hunting team, an individual contributor (technical) reporting to the Senior Manager of Cyber Threat Hunting & Automation Enablement in the GIS Cyber Threat Analysis & Response organization.

The role engages with cross-functional colleagues and external business partners. You will leverage an advanced level of knowledge & experience to perform threat hunts using a dynamic collection of tools, data, and processes. Other aspects include assisting the development of new threat hunting exercises, managing the team backlog, and contributing to new detections development. You also contribute to - and may lead - team projects and other work related to the CTH mission. This unique and exciting opportunity is ideal for individuals who are motivated, curious, creative, team-oriented, organized, intelligent, and embrace a culture of life-long learning. It offers a chance to take ones work to the next level, explore new technologies, apply experience, grow ones skillset, and regularly exercise critical thinking skills. You'll enjoy the freedom to explore, ample amounts of support, best-of-breed tools, and opportunities for great team collaboration.

We understand the challenges associated with filling specialized cybersecurity roles, and are open to training senior technical professionals who have the skills and experience required to fulfil the tasks of this role. Candidates meeting the core job requirements are encouraged to apply and will be considered.


  • Maintain awareness of threats targeting pharmaceutical companies and related industries, such as manufacturing and healthcare.
  • Contribute to the identification of new, relevant threat hunting opportunities.
  • Apply advanced technical knowledge and experience to design & execute cyber threat hunting exercises in an efficient, accurate, and complete manner.
  • Contribute to the management of the team backlog.
  • Perform all work in accordance with documented policies & procedures.
  • Maintain current, accurate, and complete documentation for all phases of threat hunting exercises.
  • Independently perform accurate & complete analysis of cyber threat hunt findings using defensible & creative investigative techniques.
  • Leverage cyber threat hunt outcomes to develop detections & other security controls that proactively mitigate risk.
  • Conceptualize and develop solutions for moderately complex challenges encountered by the team.
  • Contribute to the identification, design, and/or development of new automation capabilities and process improvements that help mature the CTH program.
  • Develop the knowledge and experience of the Pfizer environment to serve as a subject matter expert on the available logs and analysis techniques.
  • Provide training & support to junior members of the team.
  • Contribute to the ongoing development & improvement of the CTH program.
  • Exercise sound judgement and decision-making by applying expert-level knowledge and experience.
  • Perform all work in alignment with the Agile operating model established by the organization and adopted by the team.
  • Maintain awareness of team procedures, emerging threats, organization announcements, technical solution operating practices, and team communication by regularly reviewing information from various forms of documentation, threat intelligence, & business communication.


  • BS in Information Security, Computer Sciences, Information Systems, Engineering, Sciences, or related field
  • Level of professional experience showcased through several years of employment in a corporate environment supporting information security, information technology, or related functions
  • Experience querying, correlating, & analyzing large-scale datasets using tools such as Splunk, SQL, Python, and/or Microsoft Excel
  • Experience analyzing data from network solutions (firewall, proxy, IPS/IDS, network security appliances, VPN, etc.), web applications, business information systems, endpoint security solutions, and other related technologies
  • Extensive experience performing analysis of activity on Microsoft Windows endpoints, including process, network, registry, and file system events, along with related forms of activity
  • Strong understanding of TCP/IP, common network protocols, OSI model, traffic flow analysis, and common network services (DHCP, DNS, web services, email, database, etc.)
  • Ability to analyze and disposition various forms of endpoint, network, application, and / or service related collections of activity in a largely independent manner
  • Demonstrated history of being a creative thinker, curious, detail-oriented, and collaborative
  • Ability to clearly communicate potentially complex information in a concise, accurate, and complete manner in both written and verbal form
  • Ability to communicate effectively in a team setting and establish a rapport with a diverse, globally dispersed group of information security professionals
  • Commitment to training, self-paced study, and maintaining proficiency in the cybersecurity domain


  • Level of experience consistent with several years of work in a Threat Hunting, Incident Response, or Security Operations functions using a variety of security tools for monitoring a large-scale enterprise environment
  • Knowledge of information security principles and standards
  • Experience using frameworks such as the Lockheed Martin Cyber Kill Chain, Diamond Model, and / or MITRE ATT&CK to model & analyze threat activity
  • Experience developing detections and alerts using SIEM, endpoint, and network solutions
  • Experience with one or more scripting languages, such as Python, Bash, or PowerShell
  • Experience analyzing event data from common cloud services
  • Experience analyzing Linux and/or Mac OS endpoint activity
  • Security certifications such as GCIA, GCIH, GCTI, CEH, EnCE, CCE, Security+, CISSP or similar
  • Demonstrated experience working on an Agile team with an emphasis on collaboration, adaptability, prioritization, & proactive problem-solving that yields meaningful outcomes


  • Ability to perform complex data analysis

Work Location Assignment: Sandwich (Kent) with flexible working arrangements possible


We aim to create a trusting, flexible workplace culture which encourages employees to achieve work life harmony, attracts talent and enables everyone to be their best working self. 

In the UK, we have around 2,400 colleagues across four locations, working within our commercial business, research and development (R&D), manufacturing and distribution operations.

View our Top Employer profile

Get job alerts

Create a job alert and receive personalised job recommendations straight to your inbox.

Create alert