Cyber Threat Hunter in London

Cyber Threat Hunter in London

London Freelance Home office possible
Mercor

At a Glance

  • Tasks: Evaluate AI-generated threat hunt results and research hypotheses using cutting-edge tools.
  • Company: Join a leading AI research lab backed by top investors in a remote role.
  • Benefits: Competitive pay, flexible hours, and the chance to work with elite talent.
  • Other info: Dynamic remote environment with opportunities for professional growth.
  • Why this job: Make a real impact in cybersecurity while working on innovative AI projects.
  • Qualifications: 3–5 years of cybersecurity experience and strong analytical skills required.

Mercor connects elite creative and technical talent with leading AI research labs. Headquartered in San Francisco, our investors include Benchmark, General Catalyst, Peter Thiel, Adam D'Angelo, Larry Summers, and Jack Dorsey.

Position: Cybersecurity Professionals

Type: Contract

Compensation: $48–$104/hour

Location: Remote

Role Responsibilities

  • Evaluate AI-generated threat hunt results for correctness and quality.
  • Research hunt hypotheses using MITRE ATT&CK and Google Threat Intelligence.
  • Assess investigation steps and verify AI interpretation of log evidence.
  • Score outputs across five dimensions using a structured rubric.
  • Provide written comments identifying errors or gaps in AI reasoning.
  • Work independently and asynchronously on a project-based schedule.

Qualifications

Must-Have

  • 3–5+ years of professional cybersecurity experience and relevant college-level or post-graduate education.
  • Hands-on experience in threat hunting, DFIR, detection engineering, SOC analysis, or red teaming.
  • Familiarity with MITRE ATT&CK and ability to research threat actor TTPs independently.
  • Experience reading structured log data (SIEM, EDR, or endpoint telemetry).
  • Strong analytical reasoning to identify when evidence does or does not support a conclusion.

Preferred

  • Chronicle/Google SecOps experience.
  • Relevant certifications (OSCP, GIAC, CISSP, or equivalent).

Application Process (Takes 20–30 mins to complete)

  • Upload resume
  • AI interview based on your resume
  • Submit form

Resources & Support

For details about the interview process and platform information, please check: any help or support, reach out to: PS: Our team reviews applications daily. Please complete your AI interview and application steps to be considered for this opportunity.

Cyber Threat Hunter in London employer: Mercor

Mercor is an exceptional employer for Cyber Threat Hunters, offering a dynamic remote work environment that fosters creativity and technical excellence. With a strong focus on employee growth, our team members benefit from engaging with cutting-edge AI research and collaborating with industry leaders, all while enjoying the flexibility of a project-based schedule. Join us to be part of a forward-thinking company that values innovation and provides meaningful opportunities in the cybersecurity field.
Mercor

Contact Detail:

Mercor Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Cyber Threat Hunter in London

✨Tip Number 1

Get familiar with the company and its mission. When you know what Mercor stands for, you can tailor your conversations to show how your skills align with their goals. This will make you stand out during interviews!

✨Tip Number 2

Practice makes perfect! Before your AI interview, run through some common cybersecurity scenarios or questions. This will help you articulate your experience in threat hunting and make a strong impression.

✨Tip Number 3

Don’t forget to showcase your analytical skills! Be ready to discuss specific examples where you’ve identified gaps in AI reasoning or improved threat detection. Real-life stories resonate well with interviewers.

✨Tip Number 4

Apply through our website! It’s the quickest way to get your application seen by the right people. Plus, it shows you’re proactive and serious about landing that Cyber Threat Hunter role.

We think you need these skills to ace Cyber Threat Hunter in London

Cybersecurity Experience
Threat Hunting
DFIR
Detection Engineering
SOC Analysis
Red Teaming
MITRE ATT&CK
Research Skills
Log Data Analysis
SIEM
EDR
Analytical Reasoning
Structured Rubric Evaluation
Chronicle/Google SecOps
Relevant Certifications (OSCP, GIAC, CISSP)

Some tips for your application 🫡

Tailor Your Resume: Make sure your resume highlights your relevant experience in cybersecurity, especially in threat hunting and DFIR. We want to see how your skills align with the role, so don’t be shy about showcasing your hands-on experience!

Show Off Your Knowledge: When filling out your application, reference your familiarity with MITRE ATT&CK and any specific tools you've used. We love seeing candidates who can demonstrate their understanding of threat actor TTPs and how they apply them in real-world scenarios.

Be Clear and Concise: In your written comments and responses, clarity is key! We appreciate well-structured thoughts that get straight to the point. Remember, you’re scoring outputs and identifying gaps, so make your feedback as actionable as possible.

Apply Through Our Website: Don’t forget to submit your application through our website! It’s the best way for us to receive your details and ensure you’re considered for this exciting opportunity. Plus, it only takes 20–30 minutes to complete!

How to prepare for a job interview at Mercor

✨Know Your MITRE ATT&CK

Make sure you brush up on the MITRE ATT&CK framework before your interview. Familiarity with this will not only help you answer questions confidently but also demonstrate your understanding of threat actor tactics, techniques, and procedures.

✨Showcase Your Analytical Skills

Prepare to discuss specific examples from your past experience where you've used analytical reasoning to identify gaps in evidence or errors in AI interpretations. This will highlight your problem-solving abilities and your hands-on experience in threat hunting.

✨Be Ready for Technical Questions

Expect technical questions related to threat hunting, DFIR, and log data analysis. Brush up on your knowledge of SIEM, EDR, and endpoint telemetry, and be prepared to explain how you've applied these tools in real-world scenarios.

✨Communicate Clearly and Concisely

Since the role involves providing written comments on AI outputs, practice articulating your thoughts clearly. During the interview, focus on being concise yet thorough in your explanations, as this will reflect your ability to communicate effectively in a remote work environment.

Cyber Threat Hunter in London
Mercor
Location: London

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>