Staff Cyber Threat Hunter
Adobe · San Jose, CA · Engineering and Product
About this role
Adobe is hiring a staff-level Security Analyst based in San Jose, CA. The posting calls out experience with Python, SQL, Express, Kubernetes. Compensation is listed at $168,200–$310,100 per year.
- Role
- Security Analyst
- Function
- security
- Level
- staff
- Track
- Individual contributor
- Employment
- Full-time
- Location
- San Jose, CA
- Department
- Engineering and Product
- Posted
- Apr 29, 2026
More roles at Adobe
Job description
from Adobe careersThe Challenge
As a Staff Cyber Threat Hunter, you will direct proactive threat hunting campaigns to reveal advanced adversary activity that avoids standard defense mechanisms. You will act as a self-motivated technical leader. You will lead in-depth hunts and convert uncertain signals into justifiable conclusions. You will evolve findings into scalable improvements related to threat identification and prevention.
This role suits someone passionate about cybersecurity who enjoys ongoing learning, contemporary data analysis, and creating solutions to lower attacker dwell time and business risk.
What You Will Do
- Lead hunt campaigns: threat model, scope, implement, and complete high-complexity hunting campaigns informed by threat intelligence and business risk. Document hunting approach, research, and outcomes with actionable insights for long-term knowledge retention.
- Apply data-driven techniques: leverage statistical and ML-based hunting methods to analyze large datasets, identify anomalies, and surface weak signals at scale.
- Operationalize results: partner with Detection Engineering to convert hunt findings into durable detections, analytics, and improved instrumentation.
- Build automation: develop simple tools and automated solutions to fast-track hunting and investigation workflows through Python, APIs, and up-to-date development methods.
- Collaborate broadly: work closely with CSIRT, Threat Intelligence, Red Team, Security Engineering, and product teams to create multi-functional security impact.
- Communicate clearly: distill complex investigations and risk into clear, actionable updates for technical collaborators and senior leadership.