Threat Hunt Lead -- Top Secret

GD Information TechnologyHerndon, VA
Hybrid

About The Position

The Threat Hunt Lead is responsible for overseeing all cyber threat hunt, adversary analysis, malware analysis, and digital forensics mission activities under an upcoming government contract. Hunts will include operations within sensitive environments such as Operation Technology (OT), Industrial Control Systems (ICS) and other Critical Infrastructure (CI) networks. The successful leader directs multidisciplinary hunt and forensic teams providing full spectrum detection, analysis, and response capabilities that enable federal stakeholders to identify, understand, and counter sophisticated cyber threats across federal, State Local Tribal and Territorial (SLTT), commercial, critical infrastructure, and cloud environments. The Threat Hunt Lead ensures continuous detection of adversary behavior, manages simultaneously deployed hunt operations, oversees advanced malware and forensics workflows, and delivers high quality analytic products that inform national cyber defense actions. The role maintains readiness of personnel, tools, and flyaway kits to support rapid, remote, or onsite engagements.

Requirements

  • 10 + years of related experience
  • Experience leading simultaneously deployed hunt, malware analysis, digital forensics, or incident response teams within large scale, enterprise, commercial and OT/ICS cyber defense programs.
  • Deep knowledge of nation state, emerging and established adversary TTP analysis, reverse engineering, forensic acquisition, and threat detection methodologies.
  • Deep understanding and experience with host based, network, cloud, and OT/ICS forensics.
  • Strong understanding of malware analysis, dynamic/static analysis tools, and detection signature development across multiple operating environments including OT/ICS.
  • Ability to oversee multidisciplinary teams and coordinate multiple concurrent engagements.
  • Strong communication, reporting, and analytic leadership skills.
  • 10 years of overall cybersecurity experience with 5 years of management of cybersecurity teams.
  • US Citizenship Required: Yes
  • Clearance Level Must Currently Possess: Top Secret

Nice To Haves

  • Experience supporting federal stakeholders such as the DHS, DoW, the Intelligence Community (IC), the FBI and/or other national security cyber missions.
  • Experience supporting commercial threat hunting operations.
  • Experience supporting, leading and/or directing threat hunt teams within OT/ICS environments.
  • Experience supporting, leading and/or directing cyber protection teams.
  • Significant hands-on experience with advanced threat hunting techniques in air-gapped and/or otherwise sensitive operating environments.
  • Certifications such as GREM, Certified Threat Hunter (MTH), Offensive Security Certified Professional Plus (OCSP+), GIAC Penetration Tester (GPEN), GCTI, GNFA, GRID, CRTO or similar advanced technical credentials.
  • Experience with ATT&CK frameworks across Enterprise, Cloud, and ICS.
  • Experience managing deployable cyber hunt kits or rapid response teams.

Responsibilities

  • Oversee adversary, malware, and forensics analysis, including dynamic and static malware analysis, full reverse engineering of binaries, scripts, malicious documents, and artifacts to determine functionality, behavior, and command and control mechanisms.
  • Oversee digital forensic analysis of affected systems to determine malware impact, persistence mechanisms, and threat actor behavior.
  • Direct continuous analysis of established and atypical cyber defense sensor data, endpoint activity, network flows, cloud telemetry, and communications data to detect adversarial behavior and anomalous activity.
  • Oversee full spectrum hunt and incident response engagements, onsite and/or remote, ensuring teams identify threats, assess impact, and recommend remedial actions to local stakeholders.
  • Ensure teams maintain continuous awareness of emerging attack techniques, threat actors, tools, and methodologies.
  • Oversee both classified and unclassified delivery of federal stakeholder branded analytic products, intelligence deliverables, threat assessments, and technical reports that contextualize adversary activity.
  • Determine the mechanisms for the timely and accurate release of indicators to best ensure a proactive threat posture against cyber threat actors.
  • Prepare, support the delivery of, and oversee the creation of on-demand and formal reporting so as to ensure the timely and accurate reporting of shifting threat actor TTPs regardless of attribution.
  • Oversee forensic examination across host systems and digital media (phones, hard drives, memory images, etc.).
  • Direct network forensics operations to identify threat attacker behavior, develop network signatures, analyze network traffic and configurations, and produce authoritative forensic reports.
  • Oversee cloud forensic teams.
  • Manage OT/ICS forensic teams conducting analysis across industrial control systems.
  • Support, lead, direct, and oversee appropriate remediation suggestions and work with appropriate local stakeholders including OT/ICS engineers.
  • Oversee malware operations teams responsible for evaluating complex malicious code, performing static/dynamic analysis, triaging samples, and generating high quality technical reports.
  • Ensure development of custom detection signatures (YARA, SIGMA) and automated cleanup tools to enhance detection and remediation activities.
  • Oversee team's workflow for the management of malware submissions to pre-approved stakeholders only and where/when applicable, include triage, prioritization, and status tracking.
  • Ensure teams develop metrics to evaluate analysis throughput, accuracy, timeliness, and mission impact.
  • Oversee the stakeholder approved development, maintenance, and improvement of Standard Operating Procedures (SOPs), playbooks, analytic processes, workflows, robotic process automations (RPAs), and procedures supporting hunt, malware, and forensic operations.
  • Ensure teams contribute to performance metrics measuring forensic effectiveness, response quality, hunt mission impact, and operational readiness.
  • Oversee the threat hunt team’s participation in classified and unclassified interagency technical exchanges and communities of interest to strengthen national cyber defense integration.
  • Oversee readiness of all deployable hunt and forensics resources; including full capacity and reduced capacity flyaway kits, storage media, imaging systems, and tools.
  • Ensure kits are provisioned, tested, updated, sanitized, and secured in accordance with chain of custody and data handling requirements.
  • Oversee rapid deployment capabilities supporting remote or onsite incident response, exercises, and surge support events.

Benefits

  • Growth: AI-powered career tool that identifies career steps and learning opportunities
  • Support: An internal mobility team focused on helping you achieve your career goals
  • Rewards: Comprehensive benefits and wellness packages, 401K with company match, and competitive pay and paid time off
  • Community: Award-winning culture of innovation and a military-friendly workplace
  • variety of medical plan options, some with Health Savings Accounts
  • dental plan options
  • a vision plan
  • a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match.
  • full flex work weeks where possible
  • a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave.
  • short and long-term disability benefits
  • life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service