Cyber Threat Hunter
Role details
Job location
Tech stack
Job description
Are you driven by curiosity and motivated to stay ahead of cyber adversaries? As a Cyber Threat Hunter, you will proactively uncover advanced and hidden threats before they become incidents. You will think like an attacker, challenge assumptions, and help strengthen ING's resilience against evolving cyber risks.
The team
You will join ING's Global Threat Management (GTM) team, a central capability within the CISO domain that focuses on intelligence-driven, proactive defence. The team works across geographies and disciplines to anticipate emerging threats, investigate advanced attack scenarios, and continuously improve ING's detection and defensive posture. Collaboration, communication, ownership, and impact are core to how we work., * Proactively conduct intelligence-led threat hunting based on emerging threats, adversary activity, and major external cyber incidents.
- Develop and test hypothesis-driven investigations to identify unknown or evasive malicious activity.
- Analyse adversary behaviour across the full attack chain, identifying detection and control gaps.
- Translate hunt outcomes into actionable improvements for detection, prevention, and defensive architecture.
- Map findings to MITRE ATT&CK to clearly articulate threats, gaps, and priorities.
- Communicate investigation outcomes in clear, executive-ready reports that supportrisk-based decision-making.
- Leverage automation, AI-assisted analytics, and Breach & Attack Simulation (BAS) to continuously validate threat hypotheses, test adversary techniques, and prioritise high-risk attack paths.
Requirements
Do you have experience in Google Tag Manager?, * Several years of hands-on experience in threat hunting activities.
- Ability to translate threat intelligence into concrete, high-impact investigations.
- Skill in identifying meaningful security gaps rather than chasing alerts or noise.
- Capacity to think and reason like an adversary while acting as a defender.
- Ability to deliver investigation outcomes that improve detection, controls, or resilience.
- Clear communication of complex threats to both technical and non-technical stakeholders.
- Ability to work effectively in an environment with ambiguity, autonomy, and high trust.
You'll get extra points for:
- Experience or relevant certifications in cyber threat hunting, detection engineering, or adversary simulation (e.g., GIAC, MITRE ATT&CK, cloud security, or BAS-related certifications) are considered an advantage.