We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
Remote New

Applied Cyber Security Researcher

Aon
$150,000.00 - $175,000.00 / yr
life insurance, vision insurance, paid time off, paid holidays, sick time, tuition assistance, 401(k)
United States, Pennsylvania
Mar 27, 2026

Are you a hardworking Applied Cyber Security Researcher seeking a new opportunity? This could be an excellent opportunity to explore!

This position has a virtual USA workstyle. Eastern Time or Central Time Zone is preferred.

Aon is in the business of better decisions.

At Aon, we shape decisions for the better to protect and enrich the lives of people around the world!

As an organization, we are united through trust as one inclusive, diverse team, and we are passionate about helping our colleagues and clients succeed.

What the day will look like

As an Applied Cyber Security Researcher, you will spend your time researching emerging threats, analyzing various security data sets, and operationalizing intelligence into practical security outcomes. Your day work will involve malware and adversary behavior analysis, proactive threat hunting, development of detections and signals, and engineering tactical solutions to address evolving risks. You will collaborate with incident response and security operations teams to support investigations, enhance detection coverage, and integrate new security capabilities into Aon's environment.

Job Responsibilities:

Research and Analysis

  • Conduct indepth research on emerging cyber threats, attack vectors, and security vulnerabilities.
  • Perform analysis on unique and largescale security data sets to enhance security operations across Aon.
  • Analyze malware, exploit kits, and other malicious tools to understand behavior, techniques, and potential countermeasures.
Threat Intelligence
  • Gather, correlate, and analyze intelligence from multiple internal and external sources to identify potential threats.
  • Produce detailed tactical intelligence reports and threat assessments to support operational and leadership decisionmaking.
  • Develop, maintain, and improve threat intelligence feeds, tooling, and workflows.
  • Operationalize threat intelligence to improve detection, response, and overall security posture.
  • Participate in proactive threat hunting activities to identify threats and indicators of compromise within Aon's environment.
  • Apply multiple data sources to develop threat hunting hypotheses, signals, and techniques to uncover malicious activity.
  • Create and maintain threat hunting playbooks based on emerging adversary behaviors and techniques.
Incident Response Investigation Support
  • Assist in incident response activities by offering specialized knowledge and investigative support during security incidents.
  • Collaborate with the Proactive Threat Operations team, Aon AC3, and other cybersecurity teams to support investigation and response efforts.
Security Operations Enablement
  • Perform data analysis to identify trends, patterns, and indicators of compromise.
  • Create, tune, and curate detections and signals to enhance threat detection capabilities.
  • Support daytoday security operations by developing and implementing security tools, workflows, and technologies.
  • Engineer tactical solutions to address immediate security needs and active incidents.
  • Collaborate with security operations teams to integrate new security technologies and tooling into existing infrastructure.
  • Provide technical support and expertise to sustain and improve ongoing security operations.
Skills and experience that will lead to success.
  • 5+ years of experience in cybersecurity, with a strong focus on threat intelligence, threat research, or security operations
  • 3+ years of handson experience conducting cyber threat research, including analysis of emerging threats, attack vectors, and vulnerabilities
  • 3+ years of experience analyzing largescale security datasets to identify malicious activity, trends, and indicators of compromise
  • Proven experience performing malware analysis, including investigation of malicious tools, exploit kits, and attacker techniques
  • 3 or more years of demonstrated experience across the threat intelligence lifecycle, including collection, correlation, analysis, and dissemination of intelligence from multiple sources
  • Demonstrated ability to produce highquality tactical intelligence reports and threat assessments for both technical and executive audiences
  • 2+ years of experience operationalizing threat intelligence to enhance detection, incident response, and overall security posture
  • 2+ years of hands-on threat hunting experience using investigative approaches and multiple security telemetry sources
  • Solid understanding of adversary behaviors, techniques, and frameworks such as MITRE ATT&CK
  • Experience creating and maintaining threat hunting playbooks, investigative procedures, and repeatable workflows
  • Experience supporting incident response investigations, providing technical expertise during active security incidents
  • 3+ years of experience working with security operations teams (SOC, threat operations, IR) in an enterprise environment
  • Demonstrable ability to build, tune, and curate detections, alerts, and signals to improve threat detection coverage
  • Strong data analysis skills with the ability to identify patterns, anomalies, and behavioral indicators of compromise
  • Ability to engineer tactical security solutions and respond effectively in timesensitive or highpressure scenarios
  • Excellent ability to convey information clearly in writing and speech, with the capacity to explain complex threats and findings
Preferred Skills

5+ years of demonstrated experience in threat intelligence, threat hunting, or advanced security operations roles

Experience integrating and operationalizing new security technologies within a large enterprise environment

Handson experience with SIEM, EDR/XDR, SOAR, and Threat Intelligence Platforms (TIPs)

Scripting or query experience (e.g., Python, KQL, SPL, SQL) for analysis, detection engineering, or automation

Experience developing custom tooling or workflows to support threat operations and investigations

Familiarity with cloud security telemetry and hybrid enterprise environments

Prior experience working in a global, highly regulated, or complex enterprise environment

Relevant industry certifications (e.g., GCTI, GCFA, GREM, CRTO, GCIH or equivalent)

How we support our colleagues

In addition to our comprehensive benefits package, we encourage an inclusive workforce. Plus, our agile environment allows you to manage your wellbeing and work/life balance, ensuring you can be your best self at Aon. Furthermore, all colleagues enjoy two "Global Wellbeing Days" each year, encouraging you to take time to focus on yourself. We offer a variety of working style solutions for our colleagues as well.

Our continuous learning culture inspires and equips you to learn, share and grow, helping you achieve your fullest potential. As a result, at Aon, you are more connected, more relevant, and more valued.

Aon values an innovative and inclusive workplace where all colleagues feel empowered to be their authentic selves. Aon is proud to be an equal opportunity workplace.

Aon provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, creed, sex, sexual orientation, gender identity, national origin, age, disability, veteran, marital, domestic partner status, or other legally protected status. People with criminal histories are encouraged to apply.

We are committed to providing equal employment opportunities and fostering an inclusive workplace. If you require accommodations during the application or interview process, please let us know. You can request accommodations by emailing us at ReasonableAccommodations@Aon.com or your recruiter. We will work with you to meet your needs and ensure a fair and equitable experience.

For positions in San Francisco and Los Angeles, we will consider for employment qualified applicants with arrest and conviction record in accordance with local Fair Chance ordinances.

Aon is not accepting unsolicited resumes from search firms for this position. If you are a search firm, you will not be compensated in any way for your submission of a candidate, even if Aon hires that candidate.

Nothing in this job description restricts management's right to assign or reassign duties and responsibilities to this job at any time.

Pay Transparency Laws:

The salary range for this position (intended for U.S. applicants) is $150k-$175k annually. The actual salary will vary based on the applicant's education, experience, skills, and abilities, as well as internal equity and alignment with market data. The salary may also be adjusted based on the applicant's geographic location.

A summary of all the benefits offered for this position:

Aon offers a comprehensive package of benefits for full-time and regular part-time colleagues, including, but not limited to: a 401(k) savings plan with employer contributions; an employee stock purchase plan; consideration for long-term incentive awards at Aon's discretion; medical, dental and vision insurance, various types of leaves of absence, paid time off, including 12 paid holidays throughout the calendar year, 15 days of paid vacation per year, paid sick leave as provided under state and local paid sick leave laws, short-term disability and optional long-term disability, health savings account, health care and dependent care reimbursement accounts, employee and dependent life insurance and supplemental life and AD&D insurance; optional personal insurance policies, adoption assistance, tuition assistance, commuter benefits, and an employee assistance program that includes free counseling sessions. Eligibility for benefits is governed by the applicable plan documents and policies.

#LI-KH1 2576096
Applied = 0

(web-bd9584865-7clgh)