logo inner

Threat Hunt Analyst


Primary Responsibilities


The ideal Cyber Threat Hunter is someone who is process driven, curious, and enjoys identifying patterns and anomalies in data that are not immediately obvious. The Cyber Threat Hunter will:

  • Create Threat Models to better understand the CBP IT Enterprise, identify defensive gaps, and prioritize mitigations
  • Author, update, and maintain SOPs, playbooks, work instructions
  • Utilize Threat Intelligence and Threat Models to create threat hypotheses
  • Plan and scope Threat Hunt Missions to verify threat hypotheses
  • Proactively and iteratively search through systems and networks to detect advanced threats
  • Analyze host, network, and application logs in addition to malware and code
  • Prepare and report risk analysis and threat findings to appropriate stakeholders
  • Create, recommend, and assist with development of new security content as the result of hunt missions to include signatures, alerts, workflows, and automation
  • Coordinate with different teams to improve threat detection, response, and improve overall security posture of the Enterprise

Basic Qualifications:


The ideal candidate will have the following qualifications:

  • Expertise in network and host based analysis and investigation
  • Demonstrated experience planning and executing threat hunt missions
  • Understanding of complex Enterprise networks to include routing, switching, firewalls, proxies, load balancers
  • Working knowledge of common (HTTP, DNS, SMB, etc) networking protocols
  • Familiar with operation of both Windows and Linux based systems
  • Proficient with scripting languages such as Python or PowerShell
  • Familiarity with Splunk Search Processing Language (SPL) and/or Elastic Domain Specific Language (DSL)
  • The candidate must currently possess a Top Secret Clearance. In addition to clearance requirement, all CBP personnel must have a current or be able to favorably pass a 5 year background investigation (BI).
  • Should have 4 years of experience serving as a SOC Analyst or Incident Responder
  • Ability to work independently with minimal direction; self-starter/self-motivated

Life at Gray Tier Technologies

Thrive Here & What We Value- Demonstrates proficiency in DISN functions- Collaborative Environment- Focus on Technical Expertise and Innovation- Strong Commitment to National Security- Diverse Contract Team Supporting DoD Client- Fast-paced and agile environment- Customer-focused approach- Opportunity to build expertise and solve technical problems- Support of cyberspace operations- Mentorship and supervision opportunities</s>
Your tracker settings

We use cookies and similar methods to recognize visitors and remember their preferences. We also use them to measure ad campaign effectiveness, target ads and analyze site traffic. To learn more about these methods, including how to disable them, view our Cookie Policy or Privacy Policy.

By tapping `Accept`, you consent to the use of these methods by us and third parties. You can always change your tracker preferences by visiting our Cookie Policy.

logo innerThatStartupJob
Discover the best startup and their job positions, all in one place.
Copyright © 2024