Allstate Logo

Allstate

Senior Threat Hunter

Reposted 6 Days Ago
Be an Early Applicant
Remote
Hiring Remotely in US
96K-171K Annually
Senior level
Remote
Hiring Remotely in US
96K-171K Annually
Senior level
The Senior Threat Hunter will analyze security data, mentor incident response teams, and design custom analysis models for threat detection. Responsibilities include collaboration with teams on hunting techniques and threats, and providing solutions for vulnerabilities.
The summary above was generated by AI

At Allstate, great things happen when our people work together to protect families and their belongings from life’s uncertainties. And for more than 90 years our innovative drive has kept us a step ahead of our customers’ evolving needs. From advocating for seat belts, air bags and graduated driving laws, to being an industry leader in pricing sophistication, telematics, and, more recently, device and identity protection. 

Job Description

We are seeking an experienced Senior Threat Hunter to perform, intelligence-driven network defense supporting the monitoring and incident response capabilities and advise governance, technical, and business leadership on results, vulnerabilities, and solutions to mitigate. The role will involve analysis of large amounts of data from vendors and internal sources, including various indicator feeds, SIEM, and several threat intelligence tools, etc.
This individual will perform the functions of threat operations and hunting and serve as a liaison for Threat Services for the Global Security Fusion Center (GSFC), and mentor the incident handling, incident response, and forensics teams.

Key Responsibilities
  • Design and run custom analysis models on security event information to discover active threats.

  • Identify (hunting) security nuances and abnormalities in the environment.

  • Develop use cases and actionable content to identify security issues that are currently not alerted within the environment.

  • Lead projects and assignments

  • Provide custom tool design to assist in analysis and investigations.

  • Perform as an Information Security resource in three or more of the following areas:

    • Threat Intelligence

    • Incident Response

    • Log analysis (statistical modeling, correlation, pattern recognition, etc.)

    • Microsoft platform (Server, workstation, applications)

    • Open Systems platforms (Linux, UNIX, VMWare ESX, Nutanix)

    • Web Application

    • Networking (firewalls, IDS/IPS, packet capture)

    • Databases (Oracle, SQL Server, DB2, IMS)

    • SIEM

    • Reverse Engineering / Malware analysis

  • Collaborate and support teammates and outside teams with regard to threat hunting techniques/issues.

  • Communication/build rapport with other divisions and various peers

  • Identify needs, drive solutions, and provide guidance in an autonomous manner.


Job Qualifications
  • 5+ years overall technical experience in threat hunting, threat intelligence, incident response, security operations, or related information security field

  • 2+ years’ experience in penetration testing, ethical hacking, exploit writing, and/or vulnerability management

  • Bachelor's and/or Master’s Degree in IT Security, Engineering, Computers Science, or related field/experience

  • Deep understanding of common network and application stack protocols, including but not limited to TCP/IP, SMTP, DNS, TLS, XML, HTTP, etc.

  • Advanced experience with security operations tools, including but not limited to:

    • SIEM (e.g., Splunk, ArcSight)

    • Network analysis (e.g., Net Witness, Palo Alto)

    • Signature development/management (e.g., Spunk rules, Snort rules, Yara rules)

    • EDR solutions (e.g., CrowdStrike, Tanium, Defender)

  • Broad experience with various common security infrastructure tools (NIDS, HIPS, EDR, etc.

  • Scripting experience related to system administration and security operations (Python, Bash, PowerShell, Perl, C/C++)

  • Excellent analytical and problem-solving skills, a passion for research and puzzle-solving

  • Strong communication (oral, written, presentation), interpersonal and consultative skills

  • Leadership and mentorship skills

Additional Desirable Criteria
  • Experience hunting in AWS and/or Azure environments

  • Deep understanding of large, complex corporate network environments

  • Strong knowledge or experience in penetration testing, ethical hacking, exploit writing, and/or vulnerability management

  • Knowledge or experience in application design/engineering, including but not limited to programming/scripting, Windows/Linux system administration, RDBMS/NoSQL database administration, etc.

  • Recent experience with malware analysis and reverse engineering

  • Obtained certifications in several of the following: SANS GIAC courses, CEH, CISSP, OSCP, or tool-specific certifications

#LI-JJ1

Skills

Cyber Incident Response, Cybersecurity Operations, Cyber Threat Analysis, Cyber Threat Hunting, Cyber Threat Intelligence, Endpoint Detection and Response (EDR), IT Problem Solving, IT Security Operations, Penetration Testing, Results-Oriented, Scripting, Security Incident Response, SIEM Tools, Stakeholder Management, Threat Detection

Compensation

Compensation offered for this role is $95,700.00 - 170,925.00 annually and is based on experience and qualifications.

The candidate(s) offered this position will be required to submit to a background investigation.

Joining our team isn’t just a job — it’s an opportunity. One that takes your skills and pushes them to the next level. One that encourages you to challenge the status quo. One where you can shape the future of protection while supporting causes that mean the most to you. Joining our team means being part of something bigger – a winning team making a meaningful impact.

Allstate generally does not sponsor individuals for employment-based visas for this position.

Effective July 1, 2014, under Indiana House Enrolled Act (HEA) 1242, it is against public policy of the State of Indiana and a discriminatory practice for an employer to discriminate against a prospective employee on the basis of status as a veteran by refusing to employ an applicant on the basis that they are a veteran of the armed forces of the United States, a member of the Indiana National Guard or a member of a reserve component.

For jobs in San Francisco, please click “here” for information regarding the San Francisco Fair Chance Ordinance.
For jobs in Los Angeles, please click “here” for information regarding the Los Angeles Fair Chance Initiative for Hiring Ordinance.

To view the “EEO is the Law” poster click “here”. This poster provides information concerning the laws and procedures for filing complaints of violations of the laws with the Office of Federal Contract Compliance Programs

To view the FMLA poster, click “here”. This poster summarizing the major provisions of the Family and Medical Leave Act (FMLA) and telling employees how to file a complaint.

It is the Company’s policy to employ the best qualified individuals available for all jobs. Therefore, any discriminatory action taken on account of an employee’s ancestry, age, color, disability, genetic information, gender, gender identity, gender expression, sexual and reproductive health decision, marital status, medical condition, military or veteran status, national origin, race (include traits historically associated with race, including, but not limited to, hair texture and protective hairstyles), religion (including religious dress), sex, or sexual orientation that adversely affects an employee's terms or conditions of employment is prohibited. This policy applies to all aspects of the employment relationship, including, but not limited to, hiring, training, salary administration, promotion, job assignment, benefits, discipline, and separation of employment.

Top Skills

Arcsight
Bash
C/C++
Crowdstrike
Dns
HTTP
Perl
Powershell
Python
SIEM
Smtp
Splunk
Tanium
Tcp/Ip
Tls
XML

Similar Jobs

10 Days Ago
Remote or Hybrid
USA
125K-180K Annually
Senior level
125K-180K Annually
Senior level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
As a Sr. Threat Hunter at CrowdStrike, you will analyze intrusions using Falcon data, communicate findings, and enhance detection capabilities.
Top Skills: AWSAzureFalcon Endpoint DataKibanaLogscaleSplunk
2 Hours Ago
Remote or Hybrid
United States
46K-86K Annually
Mid level
46K-86K Annually
Mid level
Artificial Intelligence • Cloud • Sales • Security • Software • Cybersecurity • Data Privacy
The IT Auditor manages and conducts internal and external audits, assesses security risks, identifies control gaps, and provides audit training. Requires collaboration with compliance teams and effective communication of audit results to management.
Top Skills: AWSAzureGCPGrc ToolsIsoJIRASalesforceSnowSoc
2 Hours Ago
Remote or Hybrid
United States
73K-135K Annually
Junior
73K-135K Annually
Junior
Artificial Intelligence • Cloud • Sales • Security • Software • Cybersecurity • Data Privacy
The role involves providing technical support to SailPoint customers, troubleshooting issues, documenting solutions, and interfacing with various teams to enhance product quality and service. 24x7 on-call support is required along with a strong focus on customer satisfaction.
Top Skills: Db2J2EeJavaJava Ee 5JavaScriptJbossMssqlMySQLOracleSQLSybaseTomcatWeblogicWebsphereXML

What you need to know about the Los Angeles Tech Scene

Los Angeles is a global leader in entertainment, so it’s no surprise that many of the biggest players in streaming, digital media and game development call the city home. But the city boasts plenty of non-entertainment innovation as well, with tech companies spanning verticals like AI, fintech, e-commerce and biotech. With major universities like Caltech, UCLA, USC and the nearby UC Irvine, the city has a steady supply of top-flight tech and engineering talent — not counting the graduates flocking to Los Angeles from across the world to enjoy its beaches, culture and year-round temperate climate.

Key Facts About Los Angeles Tech

  • Number of Tech Workers: 375,800; 5.5% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Snap, Netflix, SpaceX, Disney, Google
  • Key Industries: Artificial intelligence, adtech, media, software, game development
  • Funding Landscape: $11.6 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Strong Ventures, Fifth Wall, Upfront Ventures, Mucker Capital, Kittyhawk Ventures
  • Research Centers and Universities: California Institute of Technology, UCLA, University of Southern California, UC Irvine, Pepperdine, California Institute for Immunology and Immunotherapy, Center for Quantum Science and Engineering

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account