Tier III Analyst/Threat Hunter

ArdentWashington, DC
Remote

About The Position

Ardent is seeking a Tier III Analyst to support advanced incident response and proactive threat hunting within a Virtual Security Operations Center (vSOC) environment. This role focuses on handling complex security incidents, conducting in-depth investigations, and identifying advanced threats across enterprise systems. The analyst will perform threat hunting activities, support digital forensics, and provide root cause analysis to strengthen overall security posture. This position requires strong analytical capabilities, deep experience in security operations, and the ability to operate in a fast-paced, mission-driven environment.

Requirements

  • Must be a U.S. Citizen.
  • Bachelor’s degree in Cybersecurity, Information Technology, or a related field (or equivalent experience).
  • 4+ years of experience in cybersecurity operations or incident response.
  • Experience handling complex security incidents and conducting threat investigations.
  • Experience performing threat hunting and root cause analysis.
  • Experience with SIEM platforms, preferably Microsoft Sentinel.
  • Experience analyzing logs, alerts, and security telemetry across multiple domains.
  • Strong analytical and critical thinking skills.
  • Ability to communicate findings clearly to technical and non-technical stakeholders.
  • Willingness to undergo and maintain a government-issued background investigation process.

Nice To Haves

  • GCIA, GCIH, CEH, CISSP, or equivalent cybersecurity certification.
  • Microsoft Sentinel or Microsoft security platform certification.
  • Experience with digital forensics and malware analysis.
  • Experience supporting federal or government security operations environments.
  • Experience working in secure or compliance-driven environments.

Responsibilities

  • Lead complex incident investigations and provide advanced analysis and response support.
  • Conduct proactive threat hunting activities to identify emerging threats and adversary behavior.
  • Perform root cause analysis and develop detailed incident reports.
  • Support digital forensics and malware analysis efforts.
  • Analyze endpoint, network, and identity telemetry to detect anomalous behavior.
  • Integrate threat intelligence and red team findings into detection and response workflows.
  • Provide escalation support and guidance to Tier I and Tier II analysts.
  • Develop and refine detection use cases based on observed threats and trends.
  • Document investigation processes, findings, and recommendations.
  • Collaborate with engineering teams to improve detection and response capabilities.

Benefits

  • highly competitive benefits
  • professional development opportunities
  • exceptional culture that embraces flexibility, innovation, collaboration, and career growth
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service