-
Threat Hunt Analyst
3 weeks ago
Evolver Federal Reston, United StatesJob Description · Job DescriptionEvolver Federal is looking for a Threat Hunt Analyst to join our team on a large Security Operations program with our Federal client located in Washington, DC. · This is a Remote position that allows for 100% Work from Home · The Threat Hunt Analy ...
-
Threat Hunting Analyst
1 day ago
Peraton Washington, United States Full timeResponsibilities · Peraton is seeking a Threat Hunting Analyst to join our team of qualified and diverse individuals. The qualified applicant will become part of Department of State (DOS) Consular Affairs Enterprise Infrastructure Operations (CAEIO) Program, for the Bureau of Con ...
-
Cybersecurity Hunt Analyst
3 weeks ago
The Johns Hopkins University Applied Physics Laboratory Laurel, United StatesAre you interested in being part of a highly collaborative Cybersecurity Research & Hunt Team? · Are you inquisitive and analytical with deep knowledge in Cybersecurity? · If so, we're looking for someone like you to join our team at APL · We are ranked as one of Computerworld ...
-
Cybersecurity Hunt Analyst
3 weeks ago
The Johns Hopkins University Applied Physics Laboratory Laurel, United StatesAre you interested in being part of a highly collaborative Cybersecurity Research & Hunt Team? · Are you inquisitive and analytical with deep knowledge in Cybersecurity? · If so, we're looking for someone like you to join our team at APL · We are ranked as one of Computerworld ...
-
Cyber Threat Hunt Analyst
1 week ago
Leidos Ashburn, United States Full timeDescription · The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion det ...
-
Senior Cyber Threat Hunt Analyst
4 weeks ago
Leidos Ashburn, United StatesDescription · The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion det ...
-
Threat Hunt Analyst
2 weeks ago
OneZero Solutions Washington, United StatesJob Description · Job DescriptionWe are an employee-centric company that truly appreciates our team members and their value to our customers and the missions they support. We pride ourselves on being forward-leaning thinkers and fostering teams that are and continue to be technic ...
-
Cybersecurity Hunt Analyst
3 weeks ago
Johns Hopkins Applied Physics Laboratory Laurel, United States· Are you interested in being part of a highly collaborative Cybersecurity Research & Hunt Team? · Are you inquisitive and analytical with deep knowledge in Cybersecurity? · If so, we're looking for someone like you to join our team at APL · We are ranked as one of Computerwor ...
-
Threat Hunt Analyst Mid
3 weeks ago
Gray Tier Technologies LLC Ashburn, United StatesGray Tier Technologies is looking for Threat Hunt Analyst (SME) to support the Department of Homeland Security CBP SOC. · Primary Responsibilities · •Create Threat Models to better understand the DHS IT Enterprise, identify defensive gaps, and prioritize mitigations · •Author, ...
-
Cyber Threat Hunt Analyst
6 days ago
Leidos Ashburn, United StatesThe U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and prot ...
-
Threat Hunt Analyst with Security Clearance
2 weeks ago
Base One Technologies Ashburn, United StatesThreat Hunt Analyst Mid · Primary Responsibilities · • Create Threat Models to better understand the Agency's IT Enterprise, identify defensive gaps, and prioritize mitigations · • Author, update, and maintain SOPs, playbooks, work instructions · • Utilize Threat Intelligence and ...
-
Threat Hunt Analyst with Security Clearance
2 days ago
Anonymous Employer San Francisco, United States PermanentPrimary Responsibilities · The ideal Cyber Threat Hunter is someone who is process driven, curious, and enjoys identifying patterns and anomalies in data that are not immediately obvious. The Cyber Threat Hunter will: · • Create Threat Models to better understand the Agency IT En ...
-
Senior Cyber Threat Hunt Analyst
3 weeks ago
Leidos Ashburn, United StatesDescription · The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion det ...
-
Threat Hunt Analyst Jr.
3 weeks ago
Federal Staffing Solutions Inc. Washington, United StatesWe connect our employees with some of the best opportunities around. · Time and again, our employees tell us that the most important thing we offer is respect. Federal Staffing Solutions puts people to work in all types of jobs. When you work with us, you build a relationship wit ...
-
Threat Hunt Analyst with Security Clearance
2 weeks ago
Base One Technologies Ashburn, United StatesPrimary Responsibilities · • Create Threat Models to better understand the Agency's IT Enterprise, identify defensive gaps, and prioritize mitigations · • Author, update, and maintain SOPs, playbooks, work instructions · • Utilize Threat Intelligence and Threat Models to create t ...
-
Threat Hunt Analyst with Security Clearance
2 days ago
Base One Technologies San Francisco, United States PermanentPrimary Responsibilities · • Create Threat Models to better understand the DHS IT Enterprise, identify defensive gaps, and prioritize mitigations · • Author, update, and maintain SOPs, playbooks, work instructions · • Utilize Threat Intelligence and Threat Models to create threat ...
-
Cyber Threat Hunt/Intel Analyst
3 weeks ago
XOR Security Arlington, United StatesJob Description: · XOR Security, An Agile Defense Company is actively seeking a Cyber Threat Intel Analyst to apply their technical and analytic expertise to evaluate advanced and emerging cyber threats targeting Federal Departments and Agencies (D/A) and National Critical Functi ...
-
Cyber Threat Hunt/Intel Analyst
3 weeks ago
XOR Security Arlington, United StatesJob Description:XOR Security, An Agile Defense Company is actively seeking a Cyber Threat Intel Analyst to apply their technical and analytic expertise to evaluate advanced and emerging cyber threats targeting Federal Departments and Agencies (D/A) and National Critical Functions ...
-
Senior Cyber Hunt and Incident Response Analyst
2 weeks ago
phia Arlington, United StatesAt phia we hire talented and passionate people who are focused on collaborative, meaningful work, providing technical and operational subject matter expertise and support services to our partners and clients. We are seeking a Senior Cyber Hunt & Incident Response Analyst to suppo ...
-
Threat Hunt Analyst Jr. with Security Clearance
2 weeks ago
I2X Technologies Washington, United StatesMinimum Clearance Required Secret Responsibilities I2X Technologies is a reputable technology services company to the Federal Government. Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, I2X is ready to offer ...
Threat Hunt Analyst - Reston, United States - Evolver Federal
Description
Evolver Federal is looking for aThreat Hunt Analyst
to join our team on a large Security Operations program with our Federal client located in
Washington, DC.
This is a Remote position that allows for 100% Work from Home
The Threat Hunt Analyst (THA) works to identify advanced threats within the network to track and mitigate them prior to an attack of the IT systems of the organization.
The THA will create hypotheses to conduct searches for threats inside the network with the goal of gathering data on threat behaviors, goals, and methodologies of the threat group.
The THA is responsible for organizing and analyzing the data to establish baselines for the security environment and make security recommendations to address current vulnerabilities.
Candidate will possess prior work experience in cybersecurity with an intimate knowledge of network computing and be an individual who has technical with multiple security tools.
The individual will be responsible for gathering raw data, filtering, investigating, analyzing network activity, creating the hypothesis for threat hunt operations, conduct full hunt operations, and solution security fixes based on the outcome of the hunt.
THAs will operate as part of the Incident Response team by assisting with response through the conduction of ad-hoc hunts, contributing to lessons learned and suggesting new preventative measures, and integrate threat data into security tools.
The individual will have good presentation skills and possess excellent communication skills both verbal and written.Responsibilities
Conduct security assessments to identify potential vulnerabilities, threats, or deficiencies
Support Security Operation Center and Incident Response activities
Document all hunt activities and create presentations when requested
Create detection content to support the automated identification of threats across the environment
Triage alerts generated from curated hunt team detection content and escalate as needed to other organizations within cybersecurity defense operations
Conduct research from external and internal sources, develop, and implement solutions based around new attack techniques and threats
Analyze security and event logs for anomalies and indications of malicious behavior
Determine true threats, false positives, and misconfigurations in order to provide timely solutions to detected issues
Tune analytic correlations along with other security personnel to reduce false positives and increase actionable alerts
Understanding of TCP/IP and how traffic is transported through a network
Use of security controls (firewalls, antivirus, Endpoint Detection and Response platforms, Intrusion Detection Systems, packet capture analysis, etc.) leveraged to spot anomalies
Malicious actors and the tools, techniques, and procedures they employ
Knowledge and understanding of multiple operating systems, network devices, and secure architectures
Utilizing the cyber threat hunt method to identify malicious activity in a network
Identifying threat groups and their distinct TTPs
Information assessment for network threats to include scans, computer viruses, and complex APT attacks
Hands-on experience with a Security Information and Event Management (SIEM) tool
Log analysis and how events of interest can be linked together or corroborated
Proficiency with one or more Endpoint Detection and Response Tool(s)
Basic Qualifications
Bachelor' s degree and senior industry professional certification such as a Certified Information Systems Security Professional (CISSP) or equivalent are desired
Must be able to obtain an agency-specific Public Trust clearance.
Due to the requirements of this federal customer, applicants must be Green Card Holders or US Citizens.
Due to the requirements of this federal customer, applicants must be US citizen
2 years of experience within security operations, cyber threat hunting, or content detection development, or supporting cybersecurity operations within a cyber fusion center
2 years of experience recommending mitigation Tactics Techniques and Procedures (TTPs) for identifying malicious logic within the customer's environment
2 years of experience partnering with peer cyber operations teams to understand events and support technical analysis of malicious cyber security incidents
2 years of experience tracking potential threats associated with attempted intrusions, network & host-based attacks, and coordinating incident response efforts with cyber security teams
1 year of experience with malware analysis
1 year of experience with network analysis
1 year of experience understanding CVEs
2 years of experience analyzing system, network, and application logging for attack techniques at all stages of the cyber kill chain
1 year of direct experience working with very large datasets and log analysis tools including but not limited to: Splunk and Tanium
1 year of direct experience with Qualys
Preferred Qualifications
3 years of work experience as a Threat Hunt Analyst
4 years of experience within security operations, cyber threat hunting, or content detection development, or supporting cybersecurity operations within a cyber fusion center
4 years of experience recommending mitigation Tactics Techniques and Procedures (TTPs) for identifying malicious logic within the customer's environment
4 years of experience partnering with peer cyber operations teams to understand events and support technical analysis of malicious cyber security incidents
4 years of experience tracking potential threats associated with attempted intrusions, network & host-based attacks, and coordinating incident response efforts with cyber security teams
Evolver Federal is an equal opportunity employer and welcomes all job seekers.
It is the policy of Evolver Federal not to discriminate based on race, color, ancestry, religion, gender, age, national origin, gender identity or expression, sexual orientation, genetic factors, pregnancy, physical or mental disability, military/veteran status, or any other factor protected by law.
#J-18808-Ljbffr