Job Description

Ready to join Accenture’s team of empowered people? We’re looking for candidates with the following skills and experience for this role. Do you fit the profile? If you do, we’d love to hear from you!

In adherence to Accenture’s process of Identity Verification, your resume or CV must include your photo to ensure the accuracy of your application.

Who we are:

Accenture in the Philippines is a pioneer in Accenture’s global delivery network. Over the past 30 years, we have expanded our capabilities to become a powerhouse company providing end-to-end technology and business services. As part of Accenture’s global footprint in over 120 countries, covering 40-plus industries, we have been working with the biggest companies in the country and around the globe.

Innovation, a constant at Accenture, enables us to find new ways to stay ahead of our clients’ challenges. Our inclusive, diverse, and strong culture of equality helps us constantly drive innovation in the workplace. By combining our industry expertise and the deep skills of our people with the latest technologies and our uncompromising high-performance standards, we help organizations grow their business and succeed in the digital age.

What’s in it for you?

At Accenture you will work on meaningful and innovative projects, powered by the latest technologies. You’ll be immersed in industry best practices such as event-driven architectures and domain-driven designs. Accenture will continually invest in your learning and growth. Youll work with Accenture’s certified practitioners, and Accenture will support you in growing your own tech stack and certifications.

A Threat Hunter is a highly skilled member of ATCP Security Crisis and Incident Response (CIR) Team, entrusted with the crucial responsibility of proactively identifying and mitigating security threats within an organizations network and systems. They employ a combination of manual and automated techniques to detect, analyze, and investigate potential security incidents that may have evaded traditional security controls.

As part of their role, a Threat Hunter excels in the following types of Threat Hunting in the clients environment:


  • Threat Intelligence Driven: Leveraging threat intelligence feeds and external sources, they actively search for indicators of compromise (IoCs) and emerging threat patterns to detect and neutralize potential security risks.
  • Security Incident Driven: They swiftly respond to security incidents, conducting thorough investigations to understand the extent of the compromise, its impact, and the underlying root causes. This enables them to develop effective mitigation strategies.
  • Hypothesis Driven: Utilizing their expertise and knowledge of attack vectors, they formulate hypotheses about potential threats and then systematically gather and analyze evidence to confirm or refute those hypotheses, ensuring a comprehensive
  • Threat Hunting approach.


  • Compromise Assessment via Threat Hunting: Through continuous monitoring and proactive hunting, they assess the environment for signs of compromise, identify any ongoing breaches, and initiate the appropriate response actions.

    In addition to their primary Threat Hunting duties, Threat Hunter takes on the following key responsibilities:


  • In-depth Investigations: They conduct detailed investigations into potential security incidents, employing advanced techniques to determine the nature and extent of the threat. This includes analyzing logs, network traffic, system artifacts, and other relevant data sources.
  • Collaboration and Coordination: They coordinate and collaborate with various stakeholders, including incident response teams, IT personnel, and management, to address high-priority and high-severity findings. Effective communication and teamwork are essential for successful threat mitigation.
  • Comprehensive Reporting: They prepare comprehensive reports that document investigation details, findings, and recommended remediation steps. These reports provide valuable insights to stakeholders and aid in the development of proactive security measures.


  • Job Qualifications:

    Proficient in Threat Hunting Methodologies: Possess a deep understanding of various Threat Hunting techniques, including manual log analysis, behavioral analytics, data correlation, and anomaly detection

    Strong Incident Response Knowledge: Well-versed in incident response processes and procedures

    Capable of conducting thorough investigations, analyzing collected data, and determining the scope, impact, and root cause of security incidents

    Skilled at collaborating with incident response teams to provide timely remediation recommendations

    Familiarity with MITRE ATT&CK Framework: Knowledgeable about the MITRE ATT&CK framework, including its various tactics, techniques, and procedures (TTPs)

    Able to leverage the framework to identify and categorize adversary behaviors and map them to relevant security controls

    Expertise in Digital Forensics: Proficient in conducting digital forensics investigations on both host systems and network infrastructures

    Skilled at analyzing digital evidence, performing memory, disk, and network forensics, and extracting relevant artifacts to understand the nature of security incident

    Competent in Static and Dynamic Malware Analysis: Capable of analyzing malicious software (malware) using both static and dynamic analysis techniques

    Able to analyze malware samples to understand their functionalities, persistence mechanisms, and potential impact on systems

    Strong Understanding of Networking, Operating Systems, and Security Fundamentals

    Possess a solid foundation in networking protocols, operating systems (Windows and Linux), and core security concepts

    Understand how different components interact within an IT environment and their potential security implications

    Knowledge of Various Security Technologies: Well-versed in different security technologies such as SIEM (Security Information and Event Management), endpoint security solutions, network security devices, and email security systems

    Familiar with their functionalities, deployment, and monitoring practices

    Certification is a Plus

    Possess relevant certifications in the field of cybersecurity, such as SANS GCFA (GIAC Certified Forensic Analyst), GNFA (GIAC Network Forensic Analyst), or other industry-recognized certifications

    These certifications validate expertise and demonstrate a commitment to professional development.

    Additional Information:


  • Should have minimum 3 years of experience in Threat Hunting
  • Must be amenable to work in day schedule at Cubao Site, with hybrid work set up


  • What we believe:

    All our leaders are committed to building a better, stronger and more durable company for future generations to create positive, long-lasting change. Inclusion and diversity are fundamental to our culture and core values. Our rich diversity makes us more innovative and creative, which helps us better serve our clients and our communities.

    Our position as partner to many of the world’s leading businesses, organizations and governments affords us both an extraordinary opportunity and a tremendous responsibility to make a difference. Sustainability is one of our greatest responsibilities, which we embed it into everything we do and for everyone we work with.

    Accenture is committed to providing equal employment opportunities for persons with disabilities. Please let your recruiter know if you require reasonable accommodation to enable your participation in the recruitment process, they will be happy to assist you.

    What’s in it for you?


  • Competitive Total Rewards (Compensation, Performance Bonus, 13th Month Pay, Day 1 HMO & Life Insurance Coverage)
  • Expanded maternity leave up to 120 days*
  • Expanded paternity leave up to 30 days*
  • Flexible Working Arrangements*
  • Healthy and Encouraging Work Environment
  • Company-sponsored trainings like upskilling and certification
  • Employee Stock Purchase Pan
  • Loyalty and Christmas Gift
  • Inclusion and Diversity Benefits
  • Terms & Conditions apply


  • Equal employment Opportunity Statement:

    All employment decisions shall be made without regard to age, race, creed, color, religion, gender, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law.

    Job candidates will not be obligated to disclose sealed or expunged records of conviction or arrest as part of the hiring process.

    Accenture is committed to providing veteran employment opportunities to our service men and women.

    Please read Accenture’s Recruiting and Hiring Statement for more information on how we process your data during the Recruiting and Hiring process.

    IMPORTANT REMINDER: We appreciate your interest in applying with Accenture. Please ensure to complete your profile and accomplish all required information in Workday within the next 24 hours, in order for us to start processing your application. You may access Workday by clicking the “Apply Now” button or refer to the link sent via SMS or email.


    Job Details

    Role Level: Mid-Level Work Type: Full-Time
    Country: Philippines City: Quezon City National Capital Region
    Company Website: https://www.accenture.com/ph-en Job Function: Management
    Company Industry/
    Sector:
    Software Development

    What We Offer


    About the Company

    Searching, interviewing and hiring are all part of the professional life. The TALENTMATE Portal idea is to fill and help professionals doing one of them by bringing together the requisites under One Roof. Whether you're hunting for your Next Job Opportunity or Looking for Potential Employers, we're here to lend you a Helping Hand.

    Report

    Disclaimer: talentmate.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at abuse@talentmate.com.


    Recent Jobs
    View More Jobs
    Talentmate Instagram Talentmate Facebook Talentmate YouTube Talentmate LinkedIn