Cyber Threat Hunt Lead - Clearance Required

Cydecor, IncAshburn, VA
Hybrid

About The Position

Cydecor is a premier Federal Government solutions provider, delivering differentiated innovations in mission systems and business platforms. The company leverages leading-edge secure systems and software development, backed by industry-leading subject matter expertise and business intelligence, to enable decision-support and stay ahead of evolving national security challenges. Cydecor's success is built on three core principles: People, Mission, and an unyielding commitment to Excellence. The organization is seeking an experienced Cyber Threat Hunt Lead to spearhead proactive threat hunting operations within a 24/7 Security Operations Center (SOC) environment. This critical role involves utilizing cyber threat intelligence to effectively identify, analyze, and mitigate advanced threats across various enterprise networks. The selected candidate will be responsible for providing technical leadership, operational oversight, and strategic direction across all aspects of threat hunting, detection engineering, and broader cyber defense activities.

Requirements

  • Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or related field (or equivalent experience)
  • Minimum of 5 years of experience as a senior cyber threat hunt analyst or in a similar cybersecurity role
  • Minimum of 5 years of hands-on experience conducting host-based and network-based security monitoring and analysis
  • Certified Ethical Hacker (CEH) or one of the following: DoD 8570 IAT Level II (or DoD 8140 equivalent), DoD 8570 IAM Level I (or DoD 8140 equivalent), CSSP Analyst or CSSP Incident Responder certification
  • Strong experience performing threat hunting, threat analysis, and network traversal within enterprise environments
  • Proficiency with SIEM platforms and networked-device management tools such as Splunk and Tanium
  • Hands-on experience with endpoint detection and response (EDR), intrusion detection systems (IDS), and network monitoring tools
  • Strong understanding of cyber threat intelligence and the application of TTPs to threat hunting operations
  • Experience identifying, analyzing, and responding to advanced cyber threats, including malware and intrusion activity
  • Ability to develop detection content, including queries, rules, signatures, and analytics
  • Experience analyzing scripts and code in multiple formats to support threat detection and investigation
  • Strong understanding of cybersecurity principles, attack methodologies, and adversary behaviors
  • Experience coordinating with cross-functional teams to remediate identified threats and vulnerabilities
  • Active TS/SCI (or TS with SCI eligibility) Security Clearance

Nice To Haves

  • GIAC certifications such as GCFA, GCIH, GREM, or offensive security certifications such as OSCP
  • Experience supporting federal cybersecurity programs or 24/7 SOC operations
  • Familiarity with MITRE ATT&CK framework and threat modeling methodologies
  • Experience integrating threat intelligence into detection engineering and SOC operations
  • Experience working in cloud and hybrid enterprise environments
  • Experience developing automation or scripting solutions to enhance threat hunting capabilities
  • Experience mentoring analysts and leading threat hunting teams

Responsibilities

  • Lead enterprise threat hunting operations across network, endpoint, and cloud environments to identify previously unknown or emerging threats
  • Plan, develop, and execute threat hunting campaigns based on adversary tactics, techniques, and procedures (TTPs)
  • Leverage cyber threat intelligence (CTI) to prioritize hunting activities and align efforts with current threat landscape and organizational risk
  • Analyze host and network telemetry to identify indicators of compromise (IOCs), anomalous behavior, and advanced attack patterns
  • Develop and refine detection logic, analytics, signatures, and queries to improve threat detection capabilities
  • Collaborate with incident response, threat intelligence, and security engineering teams to validate findings and coordinate remediation efforts
  • Investigate and escalate confirmed threats, ensuring proper documentation and communication with leadership and stakeholders
  • Maintain and prioritize a threat hunting backlog, tracking activities, findings, and success metrics
  • Utilize SIEM, EDR, network monitoring, and endpoint visibility tools to support threat hunting operations
  • Interpret and analyze scripts and code (e.g., Python, VBScript, C++, XML) to support threat detection and analysis efforts
  • Identify gaps in detection coverage and recommend improvements to enhance overall security posture
  • Stay current on evolving cyber threats, threat actors, and adversary methodologies to continuously improve hunting effectiveness
  • Provide technical leadership and mentorship to threat hunting analysts and SOC personnel
  • Develop reports, dashboards, and briefings to communicate findings, trends, and risk posture to leadership
  • Lead the Cyber Threat Hunt team to propose corrective actions and inform the necessary parties of security issues, reportable offenses, or cybersecurity best practices.

Benefits

  • Health and Dental Insurance
  • Vision and Life Insurance
  • Short-Term & Long-Term Disability
  • 401(K) + company match
  • Paid Time Off (PTO)
  • Paid Company Holidays
  • Tuition and Professional Development Assistance
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service