Principal Advanced Threat Response Analyst

Posted:
12/1/2025, 9:14:11 AM

Location(s):
Texas, United States

Experience Level(s):
Senior

Field(s):
IT & Security

Workplace Type:
On-site

Principal Advanced Threat Response Analyst

  

This role has been designated as ‘Remote/Teleworker’, which means you will primarily work from home.

Who We Are:

Hewlett Packard Enterprise is the global edge-to-cloud company advancing the way people live and work. We help companies connect, protect, analyze, and act on their data and applications wherever they live, from edge to cloud, so they can turn insights into outcomes at the speed required to thrive in today’s complex world. Our culture thrives on finding new and better ways to accelerate what’s next. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. If you are looking to stretch and grow your career our culture will embrace you. Open up opportunities with HPE.

Job Description:

   

At Hewlett Packard Enterprise (HPE), we are seeking a highly experienced and technically proficient Principal Advanced Threat response analyst to join our global security organization. The ideal candidate will have over a decade of hands-on experience in incident response, threat hunting, threat intelligence, digital forensics, malware analysis and incident management, with proven expertise in leading investigations into Advanced Persistent Threats (APT) and other complex, multi-stage intrusions, including widescale Ransomware attacks.

This role requires a blend of technical mastery, investigative acumen, and leadership capability. The candidate will drive proactive and reactive threat hunting efforts, lead critical incident response engagements, and develop both short-term containment and long-term remediation strategies to strengthen the organization’s cyber defense and improve overall security posture.

Key Responsibilities

  • Lead complex threat investigations involving APTs, ransomware, insider threats, and nation-state activity across enterprise and cloud environments.
  • Drive proactive threat hunting programs focused on emerging TTPs, behavioral analytics, and detection gaps within EDR, SIEM, and network telemetry data.
  • Develop and execute purple team exercises, simulating advanced adversarial tradecraft to assess detection and response capabilities.
  • Collaborate with red teams and offensive security engineers to understand attacker tools, techniques, and procedures (TTPs) at a deep technical level and translate that understanding into effective detections.
  • Perform incident command during major security events — leading multidisciplinary response teams, engaging executive stakeholders, and delivering after-action reports and strategic recommendations.
  • Develop custom detections, playbooks, and automation in Splunk, Sentinel, or other platforms to improve time-to-detect and time-to-contain metrics.
  • Mentor and coach junior analysts, hunters, and incident responders — fostering an environment of continuous learning and operational excellence.
  • Contribute to threat intelligence initiatives, enriching internal intelligence feeds with context from ongoing investigations and external research.
  • Collaborate with engineering and architecture teams to harden security controls across endpoint, network, and cloud layers.
  • Conduct tabletop exercises and technical simulations to validate response readiness and identify process or technology gaps.

Required Qualifications

  • 10+ years of experience in cybersecurity roles focused on incident response, threat hunting, digital forensics, threat intelligence, or SOC operations.
  • Proven record of leading end-to-end investigations of advanced threat campaigns (APT) or other complex multi-vector attacks.
  • Strong understanding of MITRE ATT&CK framework, adversary emulation, and kill chain analysis.
  • Demonstrated expertise in both enterprise IT and cloud security (AWS, Azure, GCP) — from defensive and offensive perspectives.
  • Working knowledge of red team / offensive security operations and the ability to deconstruct offensive tools (e.g., Cobalt Strike, Empire, Metasploit, Sliver, Mimikatz, other open-source OffSec tools) to detect their presence and behaviors.
  • Deep knowledge of SIEMs (Splunk, Sentinel, ELK), EDR platforms (CrowdStrike, Carbon Black, Defender ATP), and forensics tools.
  • Strong scripting or automation experience (Python, PowerShell, Bash) for hunting, enrichment, or data manipulation.
  • Ability to design and facilitate purple team exercises and incident response tabletop simulations replicating advanced adversary techniques.
  • Excellent communication and leadership skills; ability to brief executives, collaborate across functions, and guide junior team members.

Certifications

  • Advanced SANS certifications such as GCFA, GREM, GCIA, GNFA, GCTI, GSEC, or GCIH.
  • Offensive certifications such as OSCP, OSEP, OSED, or CRTO.
  • Recognition from hands-on platforms (e.g., Hack The Box, Cyber Defenders, TryHackMe) demonstrating technical proficiency.
  • Cloud security certifications (AWS Security Specialty, Azure Security Engineer, GCP Professional Cloud Security Engineer) are a plus.

Additional Skills:

Accountability, Accountability, Action Planning, Active Learning, Active Listening, Agile Methodology, Bias, Business, Coaching, Creativity, Critical Thinking, Cybersecurity, Data Analysis Management, Data Collection Management (비활성), Data Controls, Design Thinking, Development Methodologies, Empathy, Follow-Through, Growth Mindset, Implementation Methodologies, Infrastructure Design, Intellectual Curiosity (비활성), Long Term Planning, Managing Ambiguity {자세히(4)}

What We Can Offer You:

Health & Wellbeing

We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing.

Personal & Professional Development

We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have — whether you want to become a knowledge expert in your field or apply your skills to another division.

Unconditional Inclusion

We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good.

Let's Stay Connected:

Follow @HPECareers on Instagram to see the latest on people, culture and tech at HPE.

#unitedstates

#cybersecurity

Job:

Information Technology

Job Level:

TCP_05

    

States with Pay Range Requirement

The expected salary/wage range for a U.S.-based hire filling this position is provided below. Actual offer may vary from this range based upon geographic location, work experience, education/training, and/or skill level. If this is a sales role, then the listed salary range reflects combined base salary and target-level sales compensation pay. If this is a non-sales role, then the listed salary range reflects base salary only. Variable incentives may also be offered. Information about employee benefits offered can be found at https://myhperewards.com/main/new-hire-enrollment.html.

USD Annual Salary: $120,500.00 - $276,500.00

HPE is an Equal Employment Opportunity/ Veterans/Disabled/LGBT employer. We do not discriminate on the basis of race, gender, or any other protected category, and all decisions we make are made on the basis of qualifications, merit, and business need. Our goal is to be one global team that is representative of our customers, in an inclusive environment where we can continue to innovate and grow together. Please click here: Equal Employment Opportunity.

Hewlett Packard Enterprise is EEO Protected Veteran/ Individual with Disabilities.

   

HPE will comply with all applicable laws related to employer use of arrest and conviction records, including laws requiring employers to consider for employment qualified applicants with criminal histories.

   

No Fees Notice & Recruitment Fraud Disclaimer

 

It has come to HPE’s attention that there has been an increase in recruitment fraud whereby scammer impersonate HPE or HPE-authorized recruiting agencies and offer fake employment opportunities to candidates.  These scammers often seek to obtain personal information or money from candidates.

 

Please note that Hewlett Packard Enterprise (HPE), its direct and indirect subsidiaries and affiliated companies, and its authorized recruitment agencies/vendors will never charge any candidate a registration fee, hiring fee, or any other fee in connection with its recruitment and hiring process.  The credentials of any hiring agency that claims to be working with HPE for recruitment of talent should be verified by candidates and candidates shall be solely responsible to conduct such verification. Any candidate/individual who relies on the erroneous representations made by fraudulent employment agencies does so at their own risk, and HPE disclaims liability for any damages or claims that may result from any such communication.

Hewlett Packard Enterprise

Website: https://www.hpe.com/

Headquarter Location: Palo Alto, California, United States

Employee Count: 10001+

Year Founded: 1939

IPO Status: Private

Industries: Analytics ⋅ Computer ⋅ Consumer Software ⋅ Information Technology ⋅ IT Management ⋅ Security ⋅ Software