

Gigged.AI
Senior Threat Hunter (Jupyter Notebook, Python) - UK Based - Outside IR35
⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for a Senior Threat Hunter (Jupyter Notebook, Python) based in the UK, with a contract from 23/02/26 to 31/12/26, offering competitive pay outside IR35. Requires 5+ years in Cyber Threat Hunting, strong Python skills, and experience with MITRE ATT&CK.
🌎 - Country
United Kingdom
💱 - Currency
£ GBP
-
💰 - Day rate
Unknown
-
🗓️ - Date
February 14, 2026
🕒 - Duration
More than 6 months
-
🏝️ - Location
Remote
-
📄 - Contract
Outside IR35
-
🔒 - Security
Unknown
-
📍 - Location detailed
United Kingdom
-
🧠 - Skills detailed
#Jupyter #Unix #Automation #Computer Science #Data Pipeline #Data Analysis #AI (Artificial Intelligence) #Scala #GCP (Google Cloud Platform) #ML (Machine Learning) #Cybersecurity #Data Science #AWS (Amazon Web Services) #Pandas #Datasets #Linux #Security #Libraries #Python #Azure #Cloud #Data Enrichment
Role description
Gigged.AI is a freelance talent marketplace specialising in the IT and technology sector. We have an opportunity live at the moment with one of our clients for a Senior Threat Hunter (Jupyter Notebook, Python) - UK Based - Outside IR35
If interested then you must submit a proposal through the Gigged.AI website for this gig. You can do so here - https://app.gigged.ai/
Senior Threat Hunter - UK Based
Looking for a talented Senior Threat Hunter with strong expertise in development (Jupyter Notebook, Python) who will be part of our growing managed services group, which monitors, investigates, and resolves security incidents, violations, and suspicious activities
Fully Remote
Outside IR35 (pending final determination)
Location: UK
Start Date: 23/02/26
End Date: 31/12/26
This role is ideal for someone who approaches threat hunting not only as an investigation, but also should be able to develop customised tools, data enrichment and automated frameworks.
The candidate will be responsible for developing, optimising, and maintaining custom Jupyter based hunting environments that enable scalable, repeatable, and automated investigations across large telemetry datasets.
Responsibilities:
- Continuously research latest threat trends, APT campaigns, and emerging TTPs to develop hypothesis-driven hunt packages mapped to MITRE ATT&CK.
- Proactively drive hunting and analysis against the available dataset from various sources including, network, endpoint, and cloud environments to look for indicators of security breaches.
- Develop advanced Jupyter Notebook frameworks that supports hunt execution, data enrichment and validation.
- Develop reusable Python modules and APIs that extend Jupyter s capabilities for hunting automation in large scale, enrichment and result processing.
- Build and maintain data pipelines and automation logic to integrate threat hunting workflows with multiple telemetry and threat intel sources.
- Automate and schedule hunting notebooks through Azure ML pipelines, jobs, or equivalent orchestration frameworks, ensuring regular execution of hunting tasks.
- Implement data validation, normalisation, and correlation layers to ensure hunting accuracy.
- Create structured reporting and visualisation components using python libraries like pandas, jinja2.
- Collaborate closely with the Use Case Management, Threat Intelligence and Detection Engineering teams to identify detection gaps observed during hunts.
- Generate weekly, monthly, and ad-hoc threat hunting reports summarising hypotheses, observations, and notable findings.
Requirements:
- Bachelor s degree in Cybersecurity, Information Technology, Computer Science, or a related field (or equivalent experience).
- Proven experience of 5+ years as Cyber Threat Hunter, Detection Engineering, or Incident Response, including high skills in forensics and investigation of network, endpoint and cloud logs.
- Deep and proven knowledge and understanding of TTPs, attack frameworks (e.g., MITRE ATT&CK), and advanced threat actors.
- Experience with security applications such as datalake, SIEM tools and EDR platforms.
- Deep and proven knowledge of operating systems essentials including Linux/Unix and Windows.
- Experience analysing network traffic, packet captures, and log data.
- Proven skills on Hunting on Cloud assets - AWS, GCP, Azure.
- Proven ability to design, develop and maintain threat hunting notebooks along with analyzing and identifying anomalies from the hunt outcome.
- Strong understanding of Python libraries commonly used in data science, such as Pandas, and MsticPY.
- Advantageous to have in-depth knowledge of Jupyter Notebooks and experience in utilising them for data analysis, visualisation, and prototyping.
- Understanding modern software development lifecycles and CI/CD pipeline technologies to effectively hunt for threats and analyze security risks within automated environments.
- Experience building tooling or automation layers around detection content valid
Preferred years of experience: 8+.
Mandatory Skills, In Order of Preference:
1. Threat Hunting
1. Python Development
1. MitRE Mapping
Preferred nice-to-have skills: Jupyter Notebooks, code development.
Gigged.AI is a freelance talent marketplace specialising in the IT and technology sector. We have an opportunity live at the moment with one of our clients for a Senior Threat Hunter (Jupyter Notebook, Python) - UK Based - Outside IR35
If interested then you must submit a proposal through the Gigged.AI website for this gig. You can do so here - https://app.gigged.ai/
Senior Threat Hunter - UK Based
Looking for a talented Senior Threat Hunter with strong expertise in development (Jupyter Notebook, Python) who will be part of our growing managed services group, which monitors, investigates, and resolves security incidents, violations, and suspicious activities
Fully Remote
Outside IR35 (pending final determination)
Location: UK
Start Date: 23/02/26
End Date: 31/12/26
This role is ideal for someone who approaches threat hunting not only as an investigation, but also should be able to develop customised tools, data enrichment and automated frameworks.
The candidate will be responsible for developing, optimising, and maintaining custom Jupyter based hunting environments that enable scalable, repeatable, and automated investigations across large telemetry datasets.
Responsibilities:
- Continuously research latest threat trends, APT campaigns, and emerging TTPs to develop hypothesis-driven hunt packages mapped to MITRE ATT&CK.
- Proactively drive hunting and analysis against the available dataset from various sources including, network, endpoint, and cloud environments to look for indicators of security breaches.
- Develop advanced Jupyter Notebook frameworks that supports hunt execution, data enrichment and validation.
- Develop reusable Python modules and APIs that extend Jupyter s capabilities for hunting automation in large scale, enrichment and result processing.
- Build and maintain data pipelines and automation logic to integrate threat hunting workflows with multiple telemetry and threat intel sources.
- Automate and schedule hunting notebooks through Azure ML pipelines, jobs, or equivalent orchestration frameworks, ensuring regular execution of hunting tasks.
- Implement data validation, normalisation, and correlation layers to ensure hunting accuracy.
- Create structured reporting and visualisation components using python libraries like pandas, jinja2.
- Collaborate closely with the Use Case Management, Threat Intelligence and Detection Engineering teams to identify detection gaps observed during hunts.
- Generate weekly, monthly, and ad-hoc threat hunting reports summarising hypotheses, observations, and notable findings.
Requirements:
- Bachelor s degree in Cybersecurity, Information Technology, Computer Science, or a related field (or equivalent experience).
- Proven experience of 5+ years as Cyber Threat Hunter, Detection Engineering, or Incident Response, including high skills in forensics and investigation of network, endpoint and cloud logs.
- Deep and proven knowledge and understanding of TTPs, attack frameworks (e.g., MITRE ATT&CK), and advanced threat actors.
- Experience with security applications such as datalake, SIEM tools and EDR platforms.
- Deep and proven knowledge of operating systems essentials including Linux/Unix and Windows.
- Experience analysing network traffic, packet captures, and log data.
- Proven skills on Hunting on Cloud assets - AWS, GCP, Azure.
- Proven ability to design, develop and maintain threat hunting notebooks along with analyzing and identifying anomalies from the hunt outcome.
- Strong understanding of Python libraries commonly used in data science, such as Pandas, and MsticPY.
- Advantageous to have in-depth knowledge of Jupyter Notebooks and experience in utilising them for data analysis, visualisation, and prototyping.
- Understanding modern software development lifecycles and CI/CD pipeline technologies to effectively hunt for threats and analyze security risks within automated environments.
- Experience building tooling or automation layers around detection content valid
Preferred years of experience: 8+.
Mandatory Skills, In Order of Preference:
1. Threat Hunting
1. Python Development
1. MitRE Mapping
Preferred nice-to-have skills: Jupyter Notebooks, code development.






