Senior Threat Hunter

PeratonChandler, AZ
15d$104,000 - $166,000

About The Position

Peraton's Cyber Mission sector is looking for a Sr Threat Hunter to support a SOC. Location: Chandler, AZ or Washington DC. Role and Responsibility: Conduct proactive, intelligence-driven threat hunting to identify malicious activity that evades traditional security controls. Develop and test threat hypotheses based on adversary tactics, techniques, and procedures (TTPs), leveraging frameworks such as MITRE ATT&CK. Analyze endpoint, network, cloud, and log data to detect advanced persistent threats, insider threats, and anomalous behavior. Collaborate with SOC analysts and incident response teams to validate findings and support containment, eradication, and recovery efforts. Create and refine detection logic, queries, signatures, and analytic use cases within SIEM, EDR, and XDR platforms. Lead root cause analysis and post-incident reviews to improve SOC detection and response maturity. Produce high-quality threat intelligence reports, hunt findings, and operational briefings for technical teams and leadership. Mentor junior analysts and contribute to SOC training, playbooks, and continuous improvement initiatives. Maintain situational awareness of emerging threats, vulnerabilities, and adversary campaigns relevant to mission environments. Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Requirements

  • Minimum 8 years experience with a Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field. An additional 4 years of relevant experience will be considered in lieu of degree.
  • Minimum of 5 years of experience in data hunting, data manipulation, and advanced analytical techniques within a SOC, threat hunting, or cyber operations environments.
  • Demonstrated supervisory or team lead experience, including mentoring analysts and leading hunt or response activities.
  • Strong working knowledge of MITRE ATT&CK, adversary TTP analysis, and hypothesis-driven threat hunting methodologies.
  • Hands-on experience with SIEM platforms, security telemetry, and large-scale log analysis.
  • Proficiency in scripting and query languages, including R, Python, and SQL, to support analytics, automation, and hunt development.
  • One or more of the following certifications required: CISSP (Associate), CCSP, SSCP, GCIH, GNFA, or GCIA
  • Must also meet DoD 8570 requirements for CSSP Analyst, CSSP Infrastructure Support, or CSSP Incident Responder
  • U.S. citizenship required.
  • Active Secret security clearance required.

Nice To Haves

  • Top Secret with SCI eligibility security clearance preferred.

Responsibilities

  • Conduct proactive, intelligence-driven threat hunting to identify malicious activity that evades traditional security controls.
  • Develop and test threat hypotheses based on adversary tactics, techniques, and procedures (TTPs), leveraging frameworks such as MITRE ATT&CK.
  • Analyze endpoint, network, cloud, and log data to detect advanced persistent threats, insider threats, and anomalous behavior.
  • Collaborate with SOC analysts and incident response teams to validate findings and support containment, eradication, and recovery efforts.
  • Create and refine detection logic, queries, signatures, and analytic use cases within SIEM, EDR, and XDR platforms.
  • Lead root cause analysis and post-incident reviews to improve SOC detection and response maturity.
  • Produce high-quality threat intelligence reports, hunt findings, and operational briefings for technical teams and leadership.
  • Mentor junior analysts and contribute to SOC training, playbooks, and continuous improvement initiatives.
  • Maintain situational awareness of emerging threats, vulnerabilities, and adversary campaigns relevant to mission environments.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service