Be an Early Applicant
The Role
The Malware Reverse Engineer analyzes and develops tools against malware, bridging offensive and defensive cybersecurity efforts, and collaborates with teams to strengthen operations.
Summary Generated by Built In
SOC Threat Hunter / Splunk Architect (Purple Team Focus)
Location: Fort Meade, MD | Type: Full-Time | Clearance: TS/SCI CI polygraph required
Overview
DarkStar Intelligence is seeking a SOC Threat Hunter / Splunk Architect to support advanced Defensive Cyber Operations. This hybrid role merges SOC engineering, threat hunting, and purple team operations. You’ll help shape detection strategy, simulate adversary behavior, and respond to real-world threats supporting national security objectives at Fort Meade.
Key Responsibilities
Salary Range: $200,000 – $250,000 annually. Final compensation will be based on experience, qualifications, internal equity, and market data. DarkStar provides a competitive and comprehensive benefits package designed to support the well-being and long-term success of our full-time employees.
Additional Details
All applicants must be U.S. citizens and maintain eligibility for a U.S. government security clearance.
Location: Fort Meade, MD | Type: Full-Time | Clearance: TS/SCI CI polygraph required
Overview
DarkStar Intelligence is seeking a SOC Threat Hunter / Splunk Architect to support advanced Defensive Cyber Operations. This hybrid role merges SOC engineering, threat hunting, and purple team operations. You’ll help shape detection strategy, simulate adversary behavior, and respond to real-world threats supporting national security objectives at Fort Meade.
Key Responsibilities
- Architect and tune Splunk dashboards and alerting rules to improve detection fidelity.
- Develop and optimize custom sensors to reduce false positives and improve SOC efficiency.
- Conduct threat hunting and purple team operations, including adversary simulation and detection validation.
- Perform digital forensics and incident response (DFIR), including evidence collection and timeline analysis.
- Conduct network traffic analysis, including packet inspection and anomaly detection.
- Collaborate with red teams to align detection capabilities with adversary tradecraft.
- Brief leadership on sensor performance, threat posture, and findings.
- Clearance: Active TS/SCI with CI Polygraph
- Education/Experience: Demonstrated experience in SOC engineering or threat hunting
- Training/Certification: Hands-on Splunk expertise (dashboards, correlation rules, alert tuning)
- Knowledge of digital forensics tools (e.g., X-Ways, EnCase, Volatility) and strong understanding of TCP/IP and IDS/IPS technologies.
- Experience with purple team operations and adversary emulation.
- Penetration testing certifications (e.g., OSCP, GPEN).
- Familiarity with MITRE ATT&CK, threat hunting methodologies, and detection frameworks.
- Prior support to DoD or Intelligence Community SOC environments.
Salary Range: $200,000 – $250,000 annually. Final compensation will be based on experience, qualifications, internal equity, and market data. DarkStar provides a competitive and comprehensive benefits package designed to support the well-being and long-term success of our full-time employees.
Additional Details
- Travel: Minimal
- Work Environment: On-site at Fort Meade, MD
All applicants must be U.S. citizens and maintain eligibility for a U.S. government security clearance.
Top Skills
Assembly
C
C++
Go
Rust
Am I A Good Fit?
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.
Success! Refresh the page to see how your skills align with this role.
The Company
What We Do
DarkStar Intelligence is a Service Disabled Veteran-Owned Small Business that offers advanced intelligence-based solutions to clients in the private and public sector. Our capabilities and personnel provide unique advantages to our customers.