Please scroll down, To apply

Cyber Security Threat Hunter with Security Clearance

hiring now
New job

General Dynamics Information Technology

2024-11-07 10:45:35

salary: 143750.00 US Dollar . USD Annual

Job location Tampa, Florida, United States

Job type: fulltime

Job industry: I.T. & Communications

Job description

REQ#: RQ188900 Public Trust: None Requisition Type: Regular Your Impact Own your opportunity to work with the largest government agency in the nation. Make an impact by advancing the Department of Defense's mission to keep our country safe and secure. Job Description Position Title: Cyber Security Threat Hunter, Tier 3 Location: USCENTCOM MacDill AFB Department: Cyber Security Operations Cell (CSOC) Position Overview: The Tier 3 Cyber Security Threat Hunter is a senior-level role responsible for proactively identifying, investigating, and mitigating advanced cyber threats within the organization's network. The ideal candidate will leverage extensive experience in threat intelligence, incident response, and security monitoring to enhance our cyber defense posture. This role requires a deep understanding of the cyber threat landscape, as well as advanced analytical, critical thinking and technical skills. Key Responsibilities: Threat Detection and Analysis: Utilize advanced tools, SIEM, SOAR, EDR and Cyber Threat Intelligence Platforms and methodologies to identify anomalies and potential threats within the organization's systems and networks.
Incident Response: Lead investigations of security incidents, providing in-depth analysis and timely resolution. Collaborate with other security teams and command directorates to remediate vulnerabilities and mitigate threats.
Threat Intelligence: Assist in gathering and analyzing threat intelligence data from various sources to understand emerging threats and vulnerabilities. Implement IOCs into the threat intelligence platform and confer with other teams on mitigation and defense strategy. Share insights with relevant teams to enhance overall security posture.
Hunting Activities: Develop and execute threat-hunting strategies and hypotheses to uncover hidden threats that evade conventional security measures.
Tool Development: Assist in the development and implementation of automated tools and scripts to improve threat detection and response capabilities.
Documentation and Reporting: Maintain thorough documentation of findings, investigations, and methodologies. Present findings to stakeholders and contribute to regular security reports.
Collaboration: Work closely with incident response, security operations, and IT teams to improve threat detection and incident response capabilities.
Training and Mentorship: Provide guidance and mentorship to junior threat hunters and security analysts, fostering a culture of continuous improvement. Qualifications: Bachelor's degree in cyber security, Information Technology, or a related field; or 10 years relevant experience in cyber security and information technology.
Additional Qualifications:
Active Top-Secret Clearance with SCI eligibility
Required Certifications: Sec+ or equivalent, CEH; additional certifications are a plus to include CTIA, GCIH, GCFI, CYSA, CISSP
Minimum of 5 years of experience in cyber security, with a focus on threat hunting.
Strong knowledge of attack vectors, malware analysis, and cyber threat intelligence frameworks.
Proficiency in using SIEM (SPLUNK/ArcSight), SOAR, End Point Detection and Response, and other security tools for threat detection and analysis.
Familiarity with programming/scripting languages (Python, PowerShell, etc.) to develop tools and automate tasks.
Excellent analytical and problem-solving skills, with the ability to think critically under pressure.
Strong communication skills, both verbal and written, with the ability to present complex information clearly to non-technical stakeholders to include technical writing. Preferred Skills: Experience with cloud security (AWS, Azure, GCP) and emerging technologies.
Knowledge of regulatory requirements and compliance frameworks (GDPR, NIST, ISO 27001).
Experience with threat hunting frameworks and methodologies (MITRE ATT&CK, Diamond Model, Cyber Kill Chain). Travel Requirements: Up to 50% travel may be required for USCENTCOM Partner Nation support, including OCONUS travel throughout the year. Work Requirements Years of Experience 5 + years of related experience may vary based on technical training, certification(s), or degree Certification Security+, CE - Sec+ CE Travel Required 25-50% Citizenship U.S. Citizenship Required Salary and Benefit Information The likely salary range for this position is $106,250 - $143,750. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. View information about benefits and our total rewards program. About Our Work We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 30 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.

Inform a friend!

<!– job description page –>
Top