Security Analyst - Threat Hunter
Posted 3 days ago
Job Details
Category
Location
Salary
65 to 75 per hour
Job Description
6-month contract Senior Security Analyst role focused on threat hunting with a global organization with a hybrid work environment located in downtown Vancouver
- 6-month Security Analyst role.
- High profile team driving Cybersecurity excellence with a focus on threat hunting.
- Hybrid work environment in downtown Vancouver, 4 days a week in office.
As part of an ongoing investment in enterprise cybersecurity, our client is looking to hire a Senior Security Analyst – Threat Hunter to join their cyber team. Rather than waiting for alerts to fire, you'll be proactively hunting for threats across their endpoint, identity, network, cloud, and application environments using threat intelligence and adversary behavior knowledge to form hypotheses and go find what's hiding. You'll work closely with the SOC, Incident Response, and Threat Intelligence teams to make sure your findings don't just live in a report they translate into improved detections, refined playbooks, and stronger defenses. It's a highly analytical, hands-on role for someone who thrives on digging through large datasets and low-signal events to uncover what others miss.
Who:This client is one of the most recognizable Canadian brands, a true Vancouver success story who has expanded globally. They are well known for their corporate culture and has won major awards for their accomplishments. They have invested majorly in technology and have had an incredibly successful past few years, including a major strategic acquisition. They have an all-star leadership team who keeps you accountable and provides support while still affording you tremendous autonomy. They are located close to rapid transit in newly renovated offices in downtown Vancouver and have an in office work environment, 4 days a week in office.
You:You will bring the following education, skills and experience to the role:
- 8+ years in Security Operations with hands-on experience in threat hunting, SOC analysis, or incident response, including proactive hunting across endpoint, identity, network, cloud, and application telemetry.
- Deep understanding of adversary tactics and techniques (MITRE ATT&CK), with the ability to operationalize threat intelligence into hypothesis-driven hunts validated through data investigation rather than alert-only workflows.
- Proficiency querying and analyzing telemetry across SIEM, EDR, and logging platforms, specifically KQL, Microsoft Sentinel, Microsoft Defender, AWS, and Azure to surface anomalous or malicious activity in large datasets.
- Experience documenting hunt methodologies, findings, and outcomes, and translating validated results into detections, response actions, runbooks, and stakeholder-facing metrics and reporting.
This role pays between $65-75 per hour.
Next Steps:If the sound of this opportunity excites you, and you’re confident that it’s a good fit for your experience and career goals, then we’d love to hear from you! Please send your updated resume to us by applying to this posting and one of our awesome team of recruiters will be in touch.
About Swim Recruiting
Application closing date is 2026-05-09
Current Openings
-
Security Analyst - Detection Engineering
Swim Recruiting
Contract
-
Technical Program Manager - Cybersecurity
Swim Recruiting
Contract
-
Cybersecurity Manager
Swim Recruiting
Full Time
-
Cybersecurity Administrator
Knowledge Network
Full Time
-
Service Now Developer
Swim Recruiting
Contract
-
Security Engineer - Data
Swim Recruiting
Contract
-
Senior Financial Analyst
Swim Recruiting
Full Time
-
Business Analyst
Swim Recruiting
Contract
-
Full Time
-
Technical Program Manager
Swim Recruiting
Contract