re Looking For A strong foundation in data structures, algorithms, data modelling, and software architecture. Solid hands- on experience in Python and its ecosystem ( Jupyter, Pandas, Scikit- learn, Matplotlib), and comfort working with SQL for data analysis. Experience with LangChain is a plus. Experience of delivering AI and ML- based More ❯
project planning and stakeholder relationship management. Ability to analyze large structured and unstructured datasets, including intelligence, fraud, and business data, using tools like Python, Jupyter Notebook, Hadoop, Spark, and REST APIs. Knowledge of descriptive and prescriptive analysis, understanding data distributions, machine learning algorithms, and building KPIs based on defined problems. More ❯
on hypothesis-based hunting methodologies. Use threat intelligence, MITRE ATT&CK, and risk models to form hypotheses and validate them through structured hunts. Leverage Jupyter Notebooks and other tools to automate hunts, visualise results, and create reusable artifacts for future investigations and detections. Collaborate with detection engineering to convert threat … based solutions. Adept at leveraging Splunk for data analysis and detection development, they bring strong scripting capabilities (e.g., Python, PowerShell, SQL) and experience using Jupyter Notebooks to automate hunts and visualise results. This individual has successfully built or significantly contributed to threat hunting programs, translating threat intelligence into actionable insights … Strong use of Splunk Programming Language. Strong scripting/query language skills (e.g., Python, KQL, SQL, PowerShell). Desirable Requirements Hands-on experience using Jupyter Notebooks for data exploration, automation, and visualization in a security context. Knowledge of cloud products and log events such as Azure, Amazon Web Services, Google More ❯