About the Role

Threat Hunter / Security Analyst

About Galvanick

Galvanick protects the industrial world against cyber attacks. Our threat detection platform defends the modern world against criminals and nation-states that target Operational Technology (OT) systems and networks. This is a chance to work in a startup environment with driven individuals committed to solving cybersecurity's big problems. We are backed by Founders Fund, Village Global, MaC Venture Capital, and others.

About the Role

We are seeking a highly skilled individual to join our team as a Threat Hunter / SOC Analyst. In this role, you will play a critical role in enhancing our operational security by conducting manual threat detection operations and proactively hunting for potential threats. You will ensure the threat hunting tools and methodologies employed by the company will scale with Galvanick’s growth and success. This is a great opportunity to leverage the data collected by Galvanick to proactively hunt and identify security threats within customer systems and networks. You will provide insights through monthly reports with overview of findings and high level recommendations.

What You Will Do

  • Develop and implement effective detection strategies and ensure comprehensive threat coverage. You will be responsible for hunting and monitoring for threats using hundreds of telemetry sources from across the Galvanick platform.
  • Stay updated with the latest security trends, attack techniques, and vulnerabilities to continuously improve our threat detection capabilities.
  • Investigate and respond to security incidents, conducting thorough analysis and providing timely resolution.
  • Maintain ownership of assigned customer accounts, facilitate high levels of customer satisfaction, and be a trusted advisor for customers. You will respond to customer questions relating to threat intelligence and threat hunting.
  • Identify opportunities to increase overall customer satisfaction or streamline internal processes.
  • Perform adversary-focused threat hunting to identify abnormalities in the environment, with a focus on public cloud environments.
  • Contribute to automation and tooling that support hunting operations. Develop and maintain comprehensive documentation of threat hunting activities, findings, and remediation steps.

Who You Are

  • 5+ years of experience with one or more of the following areas, Incident Response, Security Operations, Threat Hunting, and Cyber Threat Intelligence.
  • Fluency with Python and an understanding of query languages. You are comfortable getting into the code and helping with detections.
  • Experience monitoring and analyzing telemetry data from application, infrastructure, and endpoint. 
  • In-depth knowledge of security tools, techniques, and methodologies. Familiarity with threat intelligence platforms and frameworks. 
  • Strong analytical and problem-solving skills, with the ability to think strategically and identify potential threats. 
  • Excellent understanding of attack vectors, vulnerabilities, and common security weaknesses. 
  • Proven experience as a SOC analyst or threat hunter, with a strong operational security background. 
  • Effective communication skills, with the ability to clearly convey complex security concepts to both technical and non-technical stakeholders. Experience writing monthly reports with overview of findings and high level recommendations.

Bonus Points

  • Experience conducting threat hunting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists. 
  • Knowledge of cyber threat intelligence terminology and data communication concepts and technologies. 
  • You enjoy solving problems and are naturally curious about the technologies and tools you use. 
  • Startup experience and an understanding of zero to one ideas. You enjoy attacking complex and novel problems. 
  • Experience with industrial, operational, or fulfillment environments. 
  • Relevant certifications such as CISSP, CEH, or GCIH are desirable.

Benefits

We provide top-of-the-line medical/dental/vision for employees and dependents, and have additional benefits designed to optimize every team member’s vitality, health, and wellness. Our compensation reflects the cost of labor across various geographic markets. The base pay for this position ranges from $100,000/year in our lowest geographic market up to $180,000/year in our highest geographic market. Pay is based on a number of factors including market location and may vary depending on job-related knowledge, skills, and experience. Galvanick is an early stage startup and base salary is only one component of our compensation package. Dependent on the position offered, equity may be provided as part of the compensation package, in addition to medical, financial, and/or other benefits. 

Location

The Galvanick engineering team is based in Seattle. Given that we are an early-stage startup working on an exceptionally hard problem, we expect new team members to be in office. We are happy to cover relocation expenses.

ITAR Requirements

To conform to US Government export regulations, including the International Traffic in Arms Regulations (ITAR) you must be a US citizen, lawful permanent resident of the US, protected individual as defined by 8 U.S.C. 1324b(a)(3), or eligible to obtain the required authorizations from the US Department of State. Learn more about the ITAR here.

About the Company

Galvanick is a cybersecurity company based in Seattle, WA, specializing in protecting industrial operations from cyber threats. Their flagship product, the XD/OT (Extended Detection for Operational Technology) platform, is designed to continuously monitor operational data sources in factories and critical infrastructure, detecting attacker activity and providing actionable insights to ensure operational resiliency. By contextualizing data from OT environments, Galvanick’s platform isolates real threats from background noise, helping organizations reduce downtime risk and alert fatigue while maintaining seamless, non-intrusive security. The company’s technology is particularly focused on defending against sophisticated attacks targeting SCADA and Industrial Control Systems, which are vital to sectors like manufacturing, energy, and defense.

Founded in 2021 and backed by notable investors, Galvanick has quickly established itself as an innovator in industrial cybersecurity. Employees at Galvanick have the opportunity to work on cutting-edge technology that directly impacts the safety and reliability of critical infrastructure worldwide. The company emphasizes a holistic, unified approach to threat detection, correlating data across networks, endpoints, and infrastructure to provide clear, contextual findings without overwhelming analysts. For those passionate about cybersecurity and making a tangible difference in protecting the modern world’s essential systems, Galvanick offers a mission-driven environment with a focus on operational excellence and continuous innovation.
More roles from
Galvanick
Department
Location
Galvanick

Threat Hunter / Security Analyst

Type
full-time
Department
Engineering
Location
Seattle, WA
Salary
Apply Now