Threat Hunting Analyst
Location
United States
Posted
12 days ago
Salary
Not specified
No structured requirement data.
Job Description
Role Description
We are seeking Threat Hunting Analysts – Cyber Security Specialist II (T&M) who will play a pivotal role in strengthening our Security Operations Center (SOC) capabilities at Stennis Space Center or through approved telework. In this role, you'll use advanced detection, forensics, and incident response expertise to identify sophisticated threats and protect critical federal systems.
- Leading Innovative Cybersecurity Initiatives: Proactively hunt for anomalous behavior, adversary techniques, and emerging threats using advanced detection platforms and methodologies.
- Collaborative Security Operation Support: Work alongside SOC analysts, forensic specialists, incident responders, and federal stakeholders to improve detection, response, and cyber defense operations.
- Strategic Cyber Threat Analysis: Analyze threat actor behaviors, TTPs, and indicators of compromise to inform enterprise defensive strategy and security posture.
- Engagement & Communication: Communicate findings, risks, and recommended mitigations to technical and non-technical stakeholders. Provide actionable intelligence that enhances mission success.
Qualifications
- Each Threat Hunting Analyst must hold and maintain at least two active certifications, including but not limited to: Security+, GCIH, ISC2 CISSP, GSE, GREM, GAWN, GCIA, GPPA, GSEC, GCED, GSLC, GSNA, GCFA, or other comparable certifications approved in advance by the Security Operations Branch PM.
- BA/BS or minimum three years of experience in forensics and incident response.
- Minimum two years of experience with Splunk, Wireshark, or comparable tools (approval required by Security Operations Branch PM on a case-by-case basis).
Requirements
- Ability to attain a Final TOP SECRET/SCI Clearance.
- Must meet SCI eligibility (ICD 704) with no waivers or conditions.
- Must be a sole U.S. Citizen under federal contract requirements.
Core Competencies
- Advanced analytical skills to investigate complex attacks and anomalies.
- Technical expertise across threat hunting, malware analysis, packet analysis, and enterprise logging.
- Strong communication skills to clearly articulate findings.
- Leadership and collaboration skills to work in fast-paced cyber environments.
- Commitment to supporting critical federal missions and national security.
Expectation Timeline
- Day One: Orientation to Aretec, mission goals, and SOC operations; Begin access process for clearance and technical systems; Meet team members, leadership, and federal stakeholders.
- Day Thirty: Begin actively participating in threat hunts and investigations; Understand environment topology, logging sources, and detection use cases; Demonstrate familiarity with required tools (Splunk, Wireshark, etc.).
- Day Sixty: Take ownership of assigned hunts or analytic areas; Contribute to strategic threat detection enhancements; Support incident response through findings and forensics insights.
- Day Ninety: Lead complex threat hunts and investigations; Develop new detection logic, SOPs, and process improvements; Mentor junior analysts and contribute to continuous SOC maturity.
Job Requirements
- Each Threat Hunting Analyst must hold and maintain at least two active certifications, including but not limited to: Security+, GCIH, ISC2 CISSP, GSE, GREM, GAWN, GCIA, GPPA, GSEC, GCED, GSLC, GSNA, GCFA, or other comparable certifications approved in advance by the Security Operations Branch PM.
- BA/BS or minimum three years of experience in forensics and incident response.
- Minimum two years of experience with Splunk, Wireshark, or comparable tools (approval required by Security Operations Branch PM on a case-by-case basis).
- Ability to attain a Final TOP SECRET/SCI Clearance.
- Must meet SCI eligibility (ICD 704) with no waivers or conditions.
- Must be a sole U.S. Citizen under federal contract requirements.
- Core Competencies
- Advanced analytical skills to investigate complex attacks and anomalies.
- Technical expertise across threat hunting, malware analysis, packet analysis, and enterprise logging.
- Strong communication skills to clearly articulate findings.
- Leadership and collaboration skills to work in fast-paced cyber environments.
- Commitment to supporting critical federal missions and national security.
- Expectation Timeline
- Day One: Orientation to Aretec, mission goals, and SOC operations; Begin access process for clearance and technical systems; Meet team members, leadership, and federal stakeholders.
- Day Thirty: Begin actively participating in threat hunts and investigations; Understand environment topology, logging sources, and detection use cases; Demonstrate familiarity with required tools (Splunk, Wireshark, etc.).
- Day Sixty: Take ownership of assigned hunts or analytic areas; Contribute to strategic threat detection enhancements; Support incident response through findings and forensics insights.
- Day Ninety: Lead complex threat hunts and investigations; Develop new detection logic, SOPs, and process improvements; Mentor junior analysts and contribute to continuous SOC maturity.
Related Guides
Related Categories
Related Job Pages
More Threat Intelligence Specialist Jobs
Electrical Engineer/Designer
Dialectic EngineeringDialectic is a full-service mechanical, electrical, and plumbing (MEP) engineering design and consulting firm with Headquarters located in the Crossroads of Kansas City, Missouri. Dialectic has a reputation for delivering inventive, flexible, and sustainable MEP designs for clients across the US.
The Electrical Engineer/Designer will collaborate with staff to create accurate technical drawings and contribute to the overall design process for our MEP Engineering firm which focuses on the design of systems for business, retail, housing, education, and entertainment industri...
Looking for an individual ready for a fast-paced environment. This individual will provide executive level strategy and leadership for market finance activities - specifically provision of financial analysis to support business decisions including profitability initiatives for me...
Job Description: Summary: The IT Platform Administrator acts as a liaison between the business and technical resources by ensuring the availability and successful operation of applications for users. This individual will demonstrate a high-level of responsibility and consistency ...
Job Description: Summary The Operations Support Analyst is a critical role in providing a technical interface between User Departments, Applications Development, Computer Operations and technical infrastructure disciplines. This includes job scheduling, Release Management princip...