SOC Threat Hunter / Splunk Architect (Purple Team Focus)

Reposted 12 Days Ago
Be an Early Applicant
Fort Meade, MD
In-Office
200K-250K Annually
Expert/Leader
Other
The Role
The Malware Reverse Engineer analyzes and develops tools against malware, bridging offensive and defensive cybersecurity efforts, and collaborates with teams to strengthen operations.
Summary Generated by Built In
SOC Threat Hunter / Splunk Architect (Purple Team Focus)
Location: Fort Meade, MD | Type: Full-Time | Clearance: TS/SCI CI polygraph required
Overview
DarkStar Intelligence is seeking a SOC Threat Hunter / Splunk Architect to support advanced Defensive Cyber Operations. This hybrid role merges SOC engineering, threat hunting, and purple team operations. You’ll help shape detection strategy, simulate adversary behavior, and respond to real-world threats supporting national security objectives at Fort Meade.

Key Responsibilities
  • Architect and tune Splunk dashboards and alerting rules to improve detection fidelity.
  • Develop and optimize custom sensors to reduce false positives and improve SOC efficiency.
  • Conduct threat hunting and purple team operations, including adversary simulation and detection validation.
  • Perform digital forensics and incident response (DFIR), including evidence collection and timeline analysis.
  • Conduct network traffic analysis, including packet inspection and anomaly detection.
  • Collaborate with red teams to align detection capabilities with adversary tradecraft.
  • Brief leadership on sensor performance, threat posture, and findings.
Minimum Qualifications
  • Clearance: Active TS/SCI with CI Polygraph
  • Education/Experience: Demonstrated experience in SOC engineering or threat hunting
  • Training/Certification: Hands-on Splunk expertise (dashboards, correlation rules, alert tuning)
  • Knowledge of digital forensics tools (e.g., X-Ways, EnCase, Volatility) and strong understanding of TCP/IP and IDS/IPS technologies.
Desired Qualifications
  • Experience with purple team operations and adversary emulation.
  • Penetration testing certifications (e.g., OSCP, GPEN).
  • Familiarity with MITRE ATT&CK, threat hunting methodologies, and detection frameworks.
  • Prior support to DoD or Intelligence Community SOC environments.
Compensation & Benefits
Salary Range: $200,000 – $250,000 annually. Final compensation will be based on experience, qualifications, internal equity, and market data. DarkStar provides a competitive and comprehensive benefits package designed to support the well-being and long-term success of our full-time employees.

Additional Details
  • Travel: Minimal
  • Work Environment: On-site at Fort Meade, MD
Security Note
All applicants must be U.S. citizens and maintain eligibility for a U.S. government security clearance.

Top Skills

Assembly
C
C++
Go
Rust
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Alexandria, VA
66 Employees
Year Founded: 2015

What We Do

DarkStar Intelligence is a Service Disabled Veteran-Owned Small Business that offers advanced intelligence-based solutions to clients in the private and public sector. Our capabilities and personnel provide unique advantages to our customers.

Similar Jobs

Hybrid
7 Locations
38-67
Hybrid
7 Locations
38-67
Hybrid
7 Locations
38-67
Hybrid
7 Locations
38-67

Similar Companies Hiring

Cox Enterprises Thumbnail
Software • Other • Information Technology • Greentech • Cybersecurity • Cloud • Automotive
Atlanta, GA
50000 Employees
Voltage Park Thumbnail
Software • Other • Machine Learning • Infrastructure as a Service (IaaS) • Hardware • Cloud • Artificial Intelligence
San Francisco, CA
51 Employees
Compa Thumbnail
Software • Other • HR Tech • Business Intelligence • Artificial Intelligence
Irvine, CA
60 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account