Cyber Threat Hunt Analyst with Security Clearance
Apply NowCompany: ManTech International
Location: McLean, VA 22030
Description:
ManTech seeks a motivated, career and customer-oriented Cyber Threat Hunt Analyst to join our Cyber Security Operations Center (CSOC) in McLean, VA. The ideal candidate will have a deep understanding of cyber threat hunting, advanced persistent threats (APTs), and the latest tactics, techniques, and procedures (TTPs) used by adversaries. As a Cyber Threat Hunt Analyst on our team, you play a vital role in our nation's security by helping to enhance our security posture. Responsibilities include but are not limited to: * Proactively conduct threat hunting activities to detect advanced threats that evade traditional security solutions and continuously monitor and analyze threat intelligence sources to stay informed about emerging threats.
* Search for signs of malicious activity in our network and systems. Develop and implement new and innovative threat detection techniques and strategies.
* Analyze large datasets to identify patterns and anomalies indicative of malicious activities.
* Collaborate with other CSOC team members and stakeholders to respond to and investigate security incidents. Provide detailed reports and briefings on threat hunting activities and findings to senior management.
* Develop and maintain threat hunting playbooks, processes, and procedures.
* Perform in-depth forensic analysis to understand the nature and impact of threats.
* Participate in the development and refinement of security monitoring and incident response tools and processes.
Basic Qualifications: * 2+ years of experience in cyber threat hunting, incident response, or a related cybersecurity field.
* Experience working with network protocols, operating systems, and security architectures.
* Experience using threat hunting and forensic tools.
* High School Diploma
Preferred Qualifications: * Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field; High School diploma plus additional 6 years of relevant experience in lieu of degree accepted. Master's degree preferred.
* Relevant certifications such as GCIH, GCFA, GNFA, or equivalent is highly desirable.
* Experience with scripting and programming languages such as Python, PowerShell or similar.
* Knowledge of machine learning and data analytics techniques as they apply to threat hunting.
* Familiarity with cloud security and threat hunting in cloud environments.
* Understanding of regulatory and compliance requirements related to cybersecurity (e.g., GDPR, HIPAA).
Clearance Requirement: * Active/current TS/SCI with polygraph
Physical Requirements: * must be able to remain in stationary position at least 50% of the time SKN.7.23
* Search for signs of malicious activity in our network and systems. Develop and implement new and innovative threat detection techniques and strategies.
* Analyze large datasets to identify patterns and anomalies indicative of malicious activities.
* Collaborate with other CSOC team members and stakeholders to respond to and investigate security incidents. Provide detailed reports and briefings on threat hunting activities and findings to senior management.
* Develop and maintain threat hunting playbooks, processes, and procedures.
* Perform in-depth forensic analysis to understand the nature and impact of threats.
* Participate in the development and refinement of security monitoring and incident response tools and processes.
Basic Qualifications: * 2+ years of experience in cyber threat hunting, incident response, or a related cybersecurity field.
* Experience working with network protocols, operating systems, and security architectures.
* Experience using threat hunting and forensic tools.
* High School Diploma
Preferred Qualifications: * Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field; High School diploma plus additional 6 years of relevant experience in lieu of degree accepted. Master's degree preferred.
* Relevant certifications such as GCIH, GCFA, GNFA, or equivalent is highly desirable.
* Experience with scripting and programming languages such as Python, PowerShell or similar.
* Knowledge of machine learning and data analytics techniques as they apply to threat hunting.
* Familiarity with cloud security and threat hunting in cloud environments.
* Understanding of regulatory and compliance requirements related to cybersecurity (e.g., GDPR, HIPAA).
Clearance Requirement: * Active/current TS/SCI with polygraph
Physical Requirements: * must be able to remain in stationary position at least 50% of the time SKN.7.23