Synchrony
VP, Cyber Hunt Leader
Synchrony, Charlotte, North Carolina, United States, 28245
Job Description:
Role Summary/Purpose:
The VP, Cyber Hunt Leader is part of the Synchrony Joint Security Operations Center (JSOC) leadership team. This position is responsible for identifying and leading the implementation of key initiatives that aim to enhance and mature the Synchrony threat hunt capabilities. Through collaboration with JSOC leaders, Technical Cyber Intelligence, and other cross-functional teams, this individual will execute enterprise-wide threat hunt operations to uncover sophisticated and undetected threats. The ideal candidate will be an inquisitive and curious critical thinker demonstrating significant domain expertise across three or more security domains including threat intelligence, threat hunting, incident response, digital forensics, cloud security, security engineering, security operations, endpoint security or offensive security.
Essential Responsibilities:
Lead a team of cyber threat hunters in designing and executing complex, intelligence-driven, hypothesis-based threat hunts, overseeing all phases from hypothesis drafting through final documentation and closure.
Benchmark and implement industry best practices for threat hunting and cybersecurity operations, such as MITRE ATT&CK and NIST Cybersecurity Framework (CSF).
Regularly identify, research, and analyze emerging attack techniques to develop tailored hunt content to support proactive detection efforts.
Demonstrate advanced proficiency in utilizing EDR products for threat detection, investigation, and response, leveraging their capabilities to analyze endpoint activity, identify anomalies, and facilitate timely remediation of security incidents.
Serve as the technical SME for high-impact detection and response initiatives, driving rapid enhancement of controls to address complex, priority threats effectively.
Provide technical leadership and expertise to enhance proactive threat detection capabilities, delivering recommendations that strengthen the organization’s overall security posture.
Coordinate with multidisciplinary teams across intel, detection, engineering and technology to iteratively improve security controls and detection capabilities.
Collaborate with the incident response team during declared incidents, providing expert threat-hunting support to identify, analyze, and mitigate security threats while assisting in post-incident reviews and remediation efforts.
Oversee and maintain the cyber lab environment to ensure it remains fully equipped and optimized for threat-hunting tests, control validation, and security tool evaluation.
Excellent communicator skilled at translating complex technical concepts into clear, actionable insights, effectively articulating risk and hunt strategies to senior leadership and non-technical stakeholders.
Advise management on the selection and evaluation of vendors and security technologies, collaborating with suppliers to ensure optimal tool alignment, configuration, and security posture.
Mentor and develop junior team members across cyber operations through coaching, collaboration and leadership.
Interface with industry peers to acquire and share Cyber Hunt best-practices in the sector.
Perform other duties and/or special projects as assigned.
Qualifications/Requirements:
Bachelor Degree in computer science or a related discipline and a minimum of 7 years of cyber security experience with at least 5 years focused on Threat Hunting, Incident Response, or Detection Engineering or equivalent work experience in information systems or intelligence required OR, in lieu of a degree, a high school diploma / GED and a minimum of 10 years of cyber security experience with at least 5 years focused on Threat Hunting, Incident Response, or Detection Engineering.
Expert level abilities to collect and analyze host-based artifacts across major operating systems including Windows, Linux, and MacOS.
In-depth attack surface knowledge of one or more major cloud providers (AWS, Azure, GCP).
Proficiency in using python or other similar scripting language to interact with APIs or manipulate large datasets for analysis.
One or more relevant security certifications (GCIH, GCIA, GCFE, GCFA, SANS, AWS Certified Cloud Practitioner, AWS Certified Security Specialty, or comparable).
Desired Characteristics:
Experience and familiarity with analytic standards and tradecraft.
Experience in the financial services sector.
Strong oral and written communications skills.
Strong analytical & critical thinking capabilities.
Expertise to clearly define complex issues despite incomplete or ambiguous information.
Grade/Level: 13
The salary range for this position is
150,000.00 - 250,000.00
USD Annual and is eligible for an annual bonus based on individual and company performance.
Eligibility Requirements:
You must be 18 years or older.
You must have a high school diploma or equivalent.
You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process.
You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act.
Legal authorization to work in the U.S. is required. We will not sponsor individuals for employment visas, now or in the future, for this job opening.
Our Commitment:
When you join us, you’ll be part of a diverse, inclusive culture where your skills, experience, and voice are not only heard—but valued. We celebrate the differences in all of us and believe that our individual, unique perspectives is what makes Synchrony truly a great place to work.
Reasonable Accommodation Notice:
Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job.
Job Family Group:
Information Technology
#J-18808-Ljbffr
Role Summary/Purpose:
The VP, Cyber Hunt Leader is part of the Synchrony Joint Security Operations Center (JSOC) leadership team. This position is responsible for identifying and leading the implementation of key initiatives that aim to enhance and mature the Synchrony threat hunt capabilities. Through collaboration with JSOC leaders, Technical Cyber Intelligence, and other cross-functional teams, this individual will execute enterprise-wide threat hunt operations to uncover sophisticated and undetected threats. The ideal candidate will be an inquisitive and curious critical thinker demonstrating significant domain expertise across three or more security domains including threat intelligence, threat hunting, incident response, digital forensics, cloud security, security engineering, security operations, endpoint security or offensive security.
Essential Responsibilities:
Lead a team of cyber threat hunters in designing and executing complex, intelligence-driven, hypothesis-based threat hunts, overseeing all phases from hypothesis drafting through final documentation and closure.
Benchmark and implement industry best practices for threat hunting and cybersecurity operations, such as MITRE ATT&CK and NIST Cybersecurity Framework (CSF).
Regularly identify, research, and analyze emerging attack techniques to develop tailored hunt content to support proactive detection efforts.
Demonstrate advanced proficiency in utilizing EDR products for threat detection, investigation, and response, leveraging their capabilities to analyze endpoint activity, identify anomalies, and facilitate timely remediation of security incidents.
Serve as the technical SME for high-impact detection and response initiatives, driving rapid enhancement of controls to address complex, priority threats effectively.
Provide technical leadership and expertise to enhance proactive threat detection capabilities, delivering recommendations that strengthen the organization’s overall security posture.
Coordinate with multidisciplinary teams across intel, detection, engineering and technology to iteratively improve security controls and detection capabilities.
Collaborate with the incident response team during declared incidents, providing expert threat-hunting support to identify, analyze, and mitigate security threats while assisting in post-incident reviews and remediation efforts.
Oversee and maintain the cyber lab environment to ensure it remains fully equipped and optimized for threat-hunting tests, control validation, and security tool evaluation.
Excellent communicator skilled at translating complex technical concepts into clear, actionable insights, effectively articulating risk and hunt strategies to senior leadership and non-technical stakeholders.
Advise management on the selection and evaluation of vendors and security technologies, collaborating with suppliers to ensure optimal tool alignment, configuration, and security posture.
Mentor and develop junior team members across cyber operations through coaching, collaboration and leadership.
Interface with industry peers to acquire and share Cyber Hunt best-practices in the sector.
Perform other duties and/or special projects as assigned.
Qualifications/Requirements:
Bachelor Degree in computer science or a related discipline and a minimum of 7 years of cyber security experience with at least 5 years focused on Threat Hunting, Incident Response, or Detection Engineering or equivalent work experience in information systems or intelligence required OR, in lieu of a degree, a high school diploma / GED and a minimum of 10 years of cyber security experience with at least 5 years focused on Threat Hunting, Incident Response, or Detection Engineering.
Expert level abilities to collect and analyze host-based artifacts across major operating systems including Windows, Linux, and MacOS.
In-depth attack surface knowledge of one or more major cloud providers (AWS, Azure, GCP).
Proficiency in using python or other similar scripting language to interact with APIs or manipulate large datasets for analysis.
One or more relevant security certifications (GCIH, GCIA, GCFE, GCFA, SANS, AWS Certified Cloud Practitioner, AWS Certified Security Specialty, or comparable).
Desired Characteristics:
Experience and familiarity with analytic standards and tradecraft.
Experience in the financial services sector.
Strong oral and written communications skills.
Strong analytical & critical thinking capabilities.
Expertise to clearly define complex issues despite incomplete or ambiguous information.
Grade/Level: 13
The salary range for this position is
150,000.00 - 250,000.00
USD Annual and is eligible for an annual bonus based on individual and company performance.
Eligibility Requirements:
You must be 18 years or older.
You must have a high school diploma or equivalent.
You must be willing to take a drug test, submit to a background investigation and submit fingerprints as part of the onboarding process.
You must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act.
Legal authorization to work in the U.S. is required. We will not sponsor individuals for employment visas, now or in the future, for this job opening.
Our Commitment:
When you join us, you’ll be part of a diverse, inclusive culture where your skills, experience, and voice are not only heard—but valued. We celebrate the differences in all of us and believe that our individual, unique perspectives is what makes Synchrony truly a great place to work.
Reasonable Accommodation Notice:
Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job.
Job Family Group:
Information Technology
#J-18808-Ljbffr