cover image
Allstate

Senior Threat Hunter

Remote

United states

$ 170,925 /year

Senior

Full Time

30-10-2025

Share this job:

Skills

Communication Leadership Problem Solving Python C/C++ Bash Perl PowerShell SQL NoSQL Threat Analysis Penetration Testing Incident Response Firewalls Malware Analysis Ethical Hacking Forensics Snort Splunk Monitoring VMware Stakeholder Management Problem-solving Networking Research Linux Windows System Administration Programming Databases SQL Server Azure AWS C++ TCP/IP

Job Specifications

At Allstate, great things happen when our people work together to protect families and their belongings from life’s uncertainties. And for more than 90 years our innovative drive has kept us a step ahead of our customers’ evolving needs. From advocating for seat belts, air bags and graduated driving laws, to being an industry leader in pricing sophistication, telematics, and, more recently, device and identity protection.

Job Description

We are seeking an experienced Senior Threat Hunter to perform, intelligence-driven network defense supporting the monitoring and incident response capabilities and advise governance, technical, and business leadership on results, vulnerabilities, and solutions to mitigate. The role will involve analysis of large amounts of data from vendors and internal sources, including various indicator feeds, SIEM, and several threat intelligence tools, etc.

This individual will perform the functions of threat operations and hunting and serve as a liaison for Threat Services for the Global Security Fusion Center (GSFC), and mentor the incident handling, incident response, and forensics teams.

Key Responsibilities

Design and run custom analysis models on security event information to discover active threats.
Identify (hunting) security nuances and abnormalities in the environment.
Develop use cases and actionable content to identify security issues that are currently not alerted within the environment.
Lead projects and assignments
Provide custom tool design to assist in analysis and investigations.
Perform as an Information Security resource in three or more of the following areas:
Threat Intelligence
Incident Response
Log analysis (statistical modeling, correlation, pattern recognition, etc.)
Microsoft platform (Server, workstation, applications)
Open Systems platforms (Linux, UNIX, VMWare ESX, Nutanix)
Web Application
Networking (firewalls, IDS/IPS, packet capture)
Databases (Oracle, SQL Server, DB2, IMS)
SIEM
Reverse Engineering / Malware analysis
Collaborate and support teammates and outside teams with regard to threat hunting techniques/issues.
Communication/build rapport with other divisions and various peers
Identify needs, drive solutions, and provide guidance in an autonomous manner.

Job Qualifications

5+ years overall technical experience in threat hunting, threat intelligence, incident response, security operations, or related information security field
2+ years’ experience in penetration testing, ethical hacking, exploit writing, and/or vulnerability management
Bachelor's and/or Master’s Degree in IT Security, Engineering, Computers Science, or related field/experience
Deep understanding of common network and application stack protocols, including but not limited to TCP/IP, SMTP, DNS, TLS, XML, HTTP, etc.
Advanced experience with security operations tools, including but not limited to:
SIEM (e.g., Splunk, ArcSight)
Network analysis (e.g., Net Witness, Palo Alto)
Signature development/management (e.g., Spunk rules, Snort rules, Yara rules)
EDR solutions (e.g., CrowdStrike, Tanium, Defender)
Broad experience with various common security infrastructure tools (NIDS, HIPS, EDR, etc.
Scripting experience related to system administration and security operations (Python, Bash, PowerShell, Perl, C/C++)
Excellent analytical and problem-solving skills, a passion for research and puzzle-solving
Strong communication (oral, written, presentation), interpersonal and consultative skills
Leadership and mentorship skills

Additional Desirable Criteria

Experience hunting in AWS and/or Azure environments
Deep understanding of large, complex corporate network environments
Strong knowledge or experience in penetration testing, ethical hacking, exploit writing, and/or vulnerability management
Knowledge or experience in application design/engineering, including but not limited to programming/scripting, Windows/Linux system administration, RDBMS/NoSQL database administration, etc.
Recent experience with malware analysis and reverse engineering
Obtained certifications in several of the following: SANS GIAC courses, CEH, CISSP, OSCP, or tool-specific certifications

Skills

Cyber Incident Response, Cybersecurity Operations, Cyber Threat Analysis, Cyber Threat Hunting, Cyber Threat Intelligence, Endpoint Detection and Response (EDR), IT Problem Solving, IT Security Operations, Penetration Testing, Results-Oriented, Scripting, Security Incident Response, SIEM Tools, Stakeholder Management, Threat Detection

Compensation

Compensation offered for this role is $95,700.00 - 170,925.00 annually and is based on experience and qualifications.

The candidate(s) offered this position will be required to submit to a background investigation.

Joining our team isn’t just a job — it’s an opportunity. One that takes your skills and pushes them to the next level. One that encourages you to challenge the status quo. One where you can shape the future of protection while supporting causes that mean the most to

About the Company

At Allstate, we're advocates for peace of mind and a good life. And that comes through in everything we do. From building diverse and innovative teams that truly understand our customers' needs, to challenging each other to develop our careers in a meaningful way, and finally to the incredible results we're able to achieve together. See how we’re creating a better future through innovation, advocacy, and empowering people and communities. Know more