Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Are you an expert in proactive cyber defense and incident analysis? Apply now for a long-term contract opportunity as a Threat Hunting Analyst in Mons, Belgium.
Requirements:
- 5+ years of experience in a Cyber Security related environment.
- Excellent analytical and hypothetical thinking with strong pattern recognition and deductive reasoning.
- Knowledge of Network and Host-Based Intrusion Detection Systems (NIDS/HIDS) and security event sources (Firewalls, IDS, Routers).
- Experience with Computer Forensics Tools (stand-alone, online, and network).
- Understanding of Computer Security Tools (Vulnerability Assessment, Anti-Virus, etc.).
- Experience with Network protocols and scripting languages (PowerShell, Python, etc.).
- Knowledge and practice of Data Analytics, Data Mining, and AI concepts, including Large Language Models (LLM), Retrieval Augmented Generation (RAG), and Machine Learning.
- Valid NATO Secret clearance is mandatory.
- Certifications: Highly desirable to have advanced professional SANS certifications (e.g., GCIA, GCFA, GNFA, GREM).
- Excellent written and spoken communication skills; ability to manage workload in a high-tempo environment.
- Languages: English (fluent).
Job Description:
- Prioritise, plan, and execute threat hunts to identify stealthy threats across NATO's infrastructure.
- Highlight improvements for detection and prevention methods, including IDS and SIEM correlation content.
- Produce high-quality hypotheses and detection use cases for documentation in the NCSC centralised knowledge base.
- Advise on, test, and implement Artificial Intelligence and Machine Learning technologies to improve existing defensive processes.
- Assist the NCSC in Cyber Incident Analysis and Response activities when required.
- Produce monthly reports on KPIs and activities for technical and business stakeholders; maintain Standard Operating Procedures (SOPs).
- Lead regular meetings to share successes, setbacks, and lessons learned to improve organisational security processes
Key Skills
Ranked by relevanceReady to apply?
Join Nova Hunte and take your career to the next level!
Application takes less than 5 minutes

