×
Register Here to Apply for Jobs or Post Jobs. X

Threat Hunter

Job in Overland Park, Johnson County, Kansas, 66213, USA
Listing for: TENEX.AI
Full Time position
Listed on 2026-01-02
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Job Description & How to Apply Below

Company

Summary:

TENEX.AI is an AI‑native, automation‑first, built‑for‑scale Managed Detection and Response (MDR) provider. We are a force multiplier for defenders, helping organizations enhance their cybersecurity posture through advanced threat detection, rapid response, and continuous protection. Our team is comprised of industry experts with deep experience in cybersecurity, automation, and AI‑driven solutions. We’re a fast‑growing startup backed by industry experts and top‑tier investor Andreessen Horowitz.

As an early employee, you’ll play a meaningful role in defining and building our culture. Get in on the ground floor. We’re a small but well‑funded team that just raised a substantial round – joining now comes with limited risk and unlimited upside. We are rapidly growing and seeking top talent to join our mission of revolutionizing the cybersecurity landscape.

Job Summary: We are seeking a highly skilled and proactive Threat Hunter to join our Security Operations team. The ideal candidate will have a strong background in hypothesis‑driven data analysis, including long tail and anomaly detection, cybersecurity, coupled with experience in leveraging AI and machine learning (ML) technologies, particularly in the context of Google’s Sec Ops platform (e.g. Google Chronicle), to enhance the detection, analysis, and response to security incidents.

This role is integral to safeguarding the organization’s digital infrastructure, ensuring rapid detection of threats, and supporting continuous improvement of security processes.

Culture is one of the most important things  – explore our culture deck ex.ai to witness how we embody it, prioritizing the irreplaceable collaboration and community of in‑person work.

This role will require onsite based out of our Overland Park, KS location.

Key Responsibilities:
  • Threat Hunting

    • Proactively search for indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) used by threat actors.

    • Analyze and correlate security telemetry from various sources, including SIEM, EDR, network logs, and threat intelligence feeds.

    • Conduct threat modeling and hypothesis‑driven investigations to uncover hidden threats.

    • Collaborate with SOC analysts and incident responders to investigate and contain security incidents.

    • Develop and refine detection rules, signatures, and threat hunting methodologies.

    • Stay ahead of emerging threats by researching new attack vectors, adversary techniques, and malware trends.

    • Provide detailed reports on findings, including mitigation strategies and recommendations.

    • Contribute to the continuous improvement of threat detection capabilities through automation and AI‑driven analysis.

  • Threat Monitoring & Detection

    • Monitor security alerts and events across the enterprise network, using both traditional cybersecurity tools and AI/ML‑powered threat detection systems.

    • Leverage Google Chronicle's capabilities for threat intelligence and log analysis, enhancing visibility and providing insights into potential security incidents.

    • Apply AI to identify patterns, anomalies, and behaviors indicative of potential security incidents, reducing false positives and improving detection accuracy.

  • Incident Response & Analysis

    • Investigate and analyze security incidents and breaches, leveraging AI to automate initial analysis and enhance threat hunting efforts.

    • Utilize Google Sec Ops and Chronicle's advanced tools to centralize security data, correlate events, and accelerate incident response workflows.

    • Apply machine learning algorithms to identify emerging threats and trends, providing actionable insights for incident response.

  • Google Sec Ops & Chronicle Integration

    • Work with Google Sec Ops platform tools to streamline security operations, improve threat visibility, and automate workflows.

    • Collaborate with IT, Security, and Data Science teams to integrate Google Chronicle's capabilities into the SOC, enhancing threat detection and incident resolution.

    • Optimize Google Chronicle for log management, threat hunting, and advanced analytics.

  • Security Automation

    • Develop and maintain automated workflows for common security incidents, leveraging AI for intelligent decision‑making and…

To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary