Search jobs > Washington, DC > Threat analyst

Threat Hunt Analyst

Gray Tier Technologies
Dist. of Columbia, United States
Full-time

Primary Responsibilities

The ideal Cyber Threat Hunter is someone who is process driven, curious, and enjoys identifying patterns and anomalies in data that are not immediately obvious.

The Cyber Threat Hunter will :

  • Create Threat Models to better understand the CBP IT Enterprise, identify defensive gaps, and prioritize mitigations
  • Author, update, and maintain SOPs, playbooks, work instructions
  • Utilize Threat Intelligence and Threat Models to create threat hypotheses
  • Plan and scope Threat Hunt Missions to verify threat hypotheses
  • Proactively and iteratively search through systems and networks to detect advanced threats
  • Analyze host, network, and application logs in addition to malware and code
  • Prepare and report risk analysis and threat findings to appropriate stakeholders
  • Create, recommend, and assist with development of new security content as the result of hunt missions to include signatures, alerts, workflows, and automation
  • Coordinate with different teams to improve threat detection, response, and improve overall security posture of the Enterprise

Basic Qualifications :

The ideal candidate will have the following qualifications :

  • Expertise in network and host based analysis and investigation
  • Demonstrated experience planning and executing threat hunt missions
  • Understanding of complex Enterprise networks to include routing, switching, firewalls, proxies, load balancers
  • Working knowledge of common (HTTP, DNS, SMB, etc) networking protocols
  • Familiar with operation of both Windows and Linux based systems
  • Proficient with scripting languages such as Python or PowerShell
  • Familiarity with Splunk Search Processing Language (SPL) and / or Elastic Domain Specific Language (DSL)
  • The candidate must currently possess a Top Secret Clearance. In addition to clearance requirement, all CBP personnel must have a current or be able to favorably pass a 5 year background investigation (BI).
  • Should have 4 years of experience serving as a SOC Analyst or Incident Responder
  • Ability to work independently with minimal direction; self-starter / self-motivated
  • 30+ days ago
Related jobs
Gray Tier Technologies
Washington, District of Columbia

Utilize Threat Intelligence and Threat Models to create threat hypotheses. Plan and scope Threat Hunt Missions to verify threat hypotheses. The ideal Cyber Threat Hunter is someone who is process driven, curious, and enjoys identifying patterns and anomalies in data that are not immediately obvious....

Gray Tier Technologies
Washington, District of Columbia

Utilize Threat Intelligence and Threat Models to create threat hypotheses. Plan and scope Threat Hunt Missions to verify threat hypotheses. The ideal Cyber Threat Hunter is someone who is process driven, curious, and enjoys identifying patterns and anomalies in data that are not immediately obvious....

Chenega Corporation
Washington, District of Columbia

Intermediate Threat Hunt Analyst. Intermediate Threat Hunt Analyst. Intermediate Threat Hunt Analyst. Advanced Persistent Threat (APT) and cybercriminal actors to develop attack hypotheses; working collaboratively and leveraging cyber threat intelligence, penetration testing, and other valuable anal...

Promoted
VirtualVocations
Washington, District of Columbia

A company is looking for a Cyber Threat/Vulnerability Management Analyst. ...

Promoted
Serigor Inc.
Washington, District of Columbia

The Citywide information security team is looking for 2 Tier 1 Security Analysts. The analysts follow standard operating procedures for detecting, classifying, and reporting incidents under the supervision of Tier 2 and Tier 3 staff. Perform incident response analysis uncovering attack vectors invol...

Promoted
Booz Allen Hamilton
Washington, District of Columbia

Processes and analyzes cyber threat intelligence data relating to the Defense Industrial Base (DIB), and compiles standard and ad-hoc reports as needed. Experience creating reports and briefs involving cyber incidents and threats. Leverages expertise of cyber data and information, analyzes and ident...

Promoted
SCOUT Solutions
Washington, District of Columbia

Senior Cyber Threat Intel Analyst. Candidate is applying for a Senior Cyber Threat Intel (CTI) Analyst position that supports our client in. Lead the CTI analyst on the team in the development of regular threat intelligence briefs based on general threat actor concerns across the company, business u...

Promoted
Leidos Holding
Washington, District of Columbia

Leidos has a current job opportunity for a SOC Cybersecurity Analyst on the DISA GSM-O program at the Pentagon. Pass triaged alerts to senior-level SOC personnel and assist in identifying malicious actors on customer networks. Support senior-level SOC personnel with the creation and distribution of ...

Promoted
TeleTech
Washington, District of Columbia

Processes and analyzes cyber threat intelligence data relating to the Defense Industrial Base (DIB), and compiles standard and ad-hoc reports as needed. Experience creating reports and briefs involving cyber incidents and threats. Leverages expertise of cyber data and information, analyzes and ident...

Promoted
Boston Consulting Group
Washington, District of Columbia

As a Lead Knowledge Analyst (LKA) in a Client Focused role within BCG's Public Sector Practice Area for Defense & Security, you will work in a growing global team, delivering value to clients via individual expertise and/or institutionalized knowledge assets (products, tools, data, workshops, fr...