Threat Intelligence / Threat Hunting Analyst (Cybersecurity)
Мэтч & Сопровод
Для мэтча с этой вакансией нужен Plus
Описание вакансии
TL;DR
Threat Intelligence / Threat Hunting Analyst (Cybersecurity): Proactive detection and analysis of malicious activity across enterprise networks, endpoints, and cloud environments for the FCC with an accent on threat intelligence feeds and the MITRE ATT&CK framework. Focus on developing detection rules, investigating security incidents, and supporting RMF processes.
Location: Remote (Must be able to obtain a Public Trust clearance)
Company
provides specialized cybersecurity and IT program support for federal agencies.
What you will do
- Conduct proactive threat hunting across enterprise networks, endpoints, and cloud environments.
- Analyze threat intelligence feeds, indicators of compromise (IOCs), and TTPs.
- Correlate data from SIEM and EDR/XDR tools to detect malicious activity.
- Develop and refine detection rules, use cases, and hunting methodologies.
- Investigate security incidents and produce intelligence reports for stakeholders.
- Support continuous monitoring, RMF processes, and compliance reporting.
Requirements
- Bachelor’s degree in Cybersecurity, IT, or a related field.
- Ability to obtain a Public Trust clearance.
- Experience with SIEM platforms (e.g., Splunk, QRadar) and EDR/XDR tools.
- Knowledge of MITRE ATT&CK framework, NIST frameworks, and RMF processes.
- Scripting skills in Python or PowerShell for automation and analysis.
- Relevant certifications such as Security+, CySA+, CEH, or GCIH.
Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →