Threat Hunt Analyst - Mid

Posted 12 Days Ago
Be an Early Applicant
Washington, DC, USA
In-Office
Senior level
Software
The Role
The Threat Hunt Analyst performs proactive cyber threat hunting, analyzing security event data, and supporting SOC operations to identify and mitigate threats.
Summary Generated by Built In
Threat Hunt Analyst – MidPosition Title: Threat Hunt Analyst
Program: SBA Enterprise Cybersecurity Services (ECS)Position SummaryThe Threat Hunt Analyst – Mid supports the Small Business Administration (SBA) Enterprise Cybersecurity Services (ECS) program by performing advanced cyber threat hunting, proactive adversary detection, cybersecurity operations analysis, and incident support activities. 
The Threat Hunt Analyst – Mid conducts proactive and intelligence-driven threat hunting operations across enterprise networks, cloud environments, endpoints, security monitoring platforms, and hybrid infrastructures. The role is responsible for identifying advanced threats, suspicious activity, indicators of compromise (IOCs), and adversary tactics, techniques, and procedures (TTPs) before they result in operational impact to SBA systems and mission operations.Essential Duties and Responsibilities
  • Perform proactive threat hunting activities across SBA enterprise environments in support of Task Areas 3.5.3 and 3.5.3.5.
  • Analyze security event data, endpoint telemetry, SIEM logs, network traffic, DNS activity, and cloud security data to identify indicators of malicious activity.
  • Conduct advanced threat hunting operations using behavioral analytics, threat intelligence, anomaly detection, and adversary emulation techniques.
  • Identify, investigate, and validate indicators of compromise (IOCs), indicators of attack (IOAs), and suspicious cybersecurity events.
  • Support Security Operations Center (SOC) monitoring, detection, and response activities within a 24x7x365 operational environment.
  • Perform hunting activities related to advanced persistent threats (APTs), insider threats, ransomware campaigns, credential abuse, lateral movement, and data exfiltration.
  • Correlate cyber threat intelligence with operational event data to identify emerging threats impacting SBA systems and cloud environments.
  • Develop and maintain threat hunting playbooks, procedures, detection methodologies, and use cases aligned with MITRE ATT&CK techniques.
  • Perform endpoint, host-based, and network-based threat analysis using EDR, SIEM, IDS/IPS, and forensic analysis tools.
  • Support incident response investigations by providing detailed threat analysis, timeline reconstruction, and adversary activity assessments.
  • Develop custom threat hunting queries, scripts, analytics, and detection signatures to improve enterprise threat visibility.
  • Analyze and investigate cloud security events across Microsoft Azure, Microsoft 365, AWS, Salesforce, and hybrid cloud environments.
  • Document threat hunting findings, operational assessments, intelligence summaries, and recommended remediation actions.
  • Provide technical recommendations to improve threat detection capabilities, monitoring coverage, and cybersecurity defensive measures.
  • Coordinate with SOC analysts, incident responders, engineers, federal stakeholders, and cybersecurity leadership during cyber investigations.
  • Assist with continuous tuning and optimization of SIEM correlation rules, EDR detections, and threat analytics.
  • Support cybersecurity reporting, operational briefings, and executive-level situational awareness activities.
  • Maintain awareness of emerging cyber threats, federal cybersecurity directives, CISA guidance, and evolving adversary TTPs.
  • Participate in cybersecurity exercises, tabletop events, red team/blue team activities, and operational readiness initiatives.
  • Support compliance with federal cybersecurity standards, policies, and operational procedures.
Minimum Qualifications
  • Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, Information Assurance, Intelligence Studies, or related discipline. Relevant experience may substitute for degree requirements.
  • Minimum of 5 years of experience supporting threat hunting, cybersecurity operations, cyber defense, incident response, or SOC environments.
  • Hands-on experience conducting proactive cyber threat hunting and adversary analysis activities.
  • Experience using SIEM, EDR, IDS/IPS, network monitoring, packet analysis, and cyber defense technologies.
  • Knowledge of MITRE ATT&CK framework, cyber kill chain methodologies, and adversary TTP analysis.
  • Experience analyzing Windows, Linux, cloud, and network security logs.
  • Familiarity with scripting and query languages such as PowerShell, Python, KQL, Splunk SPL, or SQL.
  • Experience supporting federal cybersecurity operations and compliance frameworks including NIST guidance.
  • Strong analytical, investigative, communication, and technical reporting skills.
  • Ability to operate effectively in fast-paced, mission-critical cybersecurity environments.
Preferred Certifications
  • GIAC Certified Enterprise Defender (GCED)
  • GIAC Cyber Threat Intelligence (GCTI)
  • GIAC Certified Incident Handler (GCIH)
  • Certified Ethical Hacker (CEH)
  • CompTIA CySA+
  • CompTIA Security+
  • Certified SOC Analyst (CSA)
  • Microsoft Security Operations Analyst Associate (SC-200)

Skills Required

  • Bachelor's degree in Cybersecurity, Computer Science, or related discipline
  • Minimum of 5 years of experience in threat hunting or cybersecurity operations
  • Hands-on experience with cyber threat hunting and adversary analysis
  • Experience using SIEM, EDR, IDS/IPS, and other cyber defense technologies
  • Knowledge of MITRE ATT&CK framework and cyber kill chain development
  • Experience analyzing Windows, Linux, and cloud security logs
  • Familiarity with scripting and query languages such as PowerShell, Python, KQL
  • Experience supporting federal cybersecurity compliance frameworks
  • Strong analytical and communication skills
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Largo, MD
25 Employees
Year Founded: 2006

What We Do

Established in 2006, cFocus Software automates FedRAMP compliance and develops government chatbots for the Azure Government Cloud, Office 365, and SharePoint. cFocus Software is the exclusive vendor of ATO (Authority To Operate) as a Service™, which automates FedRAMP compliance for the Azure Government Cloud and Office 365. Contact Us for a demo of ATO as a Service™ or a FREE government chatbot proof of concept project today!

Similar Jobs

Cox Enterprises Logo Cox Enterprises

Campaign Coordinator (Dealer.com)

Artificial Intelligence • Automotive • Greentech • Information Technology • Machine Learning • Software • Cybersecurity
Remote or Hybrid
United States
50000 Employees
20-30 Hourly

Cox Enterprises Logo Cox Enterprises

Manager, Key Account Marketing

Artificial Intelligence • Automotive • Greentech • Information Technology • Machine Learning • Software • Cybersecurity
Remote or Hybrid
United States
50000 Employees
89K-134K Annually

Zscaler Logo Zscaler

Senior Value Advisor

Cloud • Information Technology • Security • Software • Cybersecurity
Easy Apply
Remote or Hybrid
USA
8697 Employees
165K-235K Annually

BAE Systems, Inc. Logo BAE Systems, Inc.

Systems Engineer

Aerospace • Hardware • Information Technology • Security • Software • Cybersecurity • Defense
Hybrid
Washington, DC, USA
40000 Employees
133K-226K Annually

Similar Companies Hiring

Fairly Even Thumbnail
Hardware • Other • Robotics • Sales • Software • Hospitality
New York, NY
30 Employees
Kepler  Thumbnail
Fintech • Software
New York, New York
6 Employees
Onshore Thumbnail
Artificial Intelligence • Fintech • Software • Financial Services
New York, New York
60 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account