Threat Hunting Analyst supporting Sales/Pre-Sales teams demonstrating threat detection capabilities at Bolster. Conducting investigations, analyzing phishing infrastructure, and building customer trust.
Responsibilities
Conduct investigative threat hunts for Bolster’s prospective customers across web, social media platforms, mobile applications etc.
Identify phishing, scam, impersonation, malicious domains, credential harvesting sites, fake login portals, and related attacker infrastructure across multiple modules.
Analyze phishing infrastructure including domains, hosting patterns, redirects, phishing kits, cloaking techniques, and attacker tooling.
Prepare detailed pre-sales investigation reports, executive summaries, and technical findings tailored to customer audiences.
Partner closely with Sales team during demos and proof-of-concept (POC) engagements.
Support RFP/RFI responses with technical inputs related to threat hunting, detection capabilities, and investigative workflows.
Generate periodic and ad-hoc reports highlighting threat activity and detection insights.
Contribute to internal knowledge repositories and reusable investigation playbooks for pre-sales use cases.
Requirements
2+ years of hands-on experience in threat hunting, with prior experience in supporting Pre-Sales team, or customer demos in a cybersecurity environment.
Strong understanding of threat hunting methodologies and the threat intelligence lifecycle.
Ability to work independently in a fast-paced, SLA-driven environment.
Experience analyzing phishing emails, websites, SMS, ads, domain abuse, and social media impersonation.
Familiarity with phishing kits, hosting analysis, domain infrastructure, and attacker tradecraft.
Experience working with OSINT tools, enrichment platforms, and large datasets.
Ability to translate technical findings into clear, customer-friendly narratives.
Strong written and verbal communication skills.
Experience in startup or high-growth environments is a plus.
Benefits
Please note that this role requires in-office collaboration/attendance 3X a week
Job title
Security Analyst II, Threat Hunting – Pre-Sales Support
Information Security Analyst overseeing security tools and incident responses. Engaging in corporate security initiatives within a technological framework.
Cyber Security Analyst role supporting USAF Cloud One Architecture and common shared services contract. Involves compliance monitoring, incident response, and collaboration with cybersecurity teams.
Senior Cyber Security Analyst at GDIT identifying and mitigating cyber threats while ensuring compliance with NIST and ISO standards. Involves oversight of security controls and enterprise risk assessments.
Junior Information Security Analyst focusing on identity and access management at Evertec. Supporting operational activities and collaborating with IT and security teams in a hybrid setting.
Senior Cybersecurity Engineer at 3CON responsible for detection and response engineering in Brazilian pharmaceutical retail. Collaborating with teams and improving security controls continuously.
Lead Security Analyst managing operational guidance and analytical oversight for security across crisis regions. Collaborating for timely decision - making and information delivery to clients in the field.
Analista de Segurança da Informação na Minsait investigando e respondendo a incidentes de segurança. Envolvimento em gestão de vulnerabilidades e boas práticas de segurança.
Senior Security Analyst providing advanced cybersecurity services in Stockholm and Malmö. Monitoring environments and handling incidents while collaborating with clients to ensure cybersecurity resilience.
Staff Cybersecurity Analyst focusing on cloud security for Southern Glazer’s. Leading security assessments, managing incidents, and collaborating with teams to enhance security posture.
Analyst supporting Nuclear Cyber Security program at Duke Energy. Addressing cyber security threats and managing compliance across multiple nuclear operations.