Cyber Security Threat Hunter

USA FL MacDill AFB - MacDill AFB (FLC007)

General Dynamics Information Technology

Delivering consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community.

View all jobs at General Dynamics Information Technology

Apply now Apply later

Type of Requisition:

Regular

Clearance Level Must Currently Possess:

Top Secret/SCI

Clearance Level Must Be Able to Obtain:

Top Secret/SCI

Suitability:

Public Trust/Other Required:

None

Job Family:

Information Security

Job Qualifications:

Skills:

Cyber Defense, Cybersecurity, Cyber Threat Intelligence, Threat Detection

Certifications:

Security+, CE - Sec+ CE

Experience:

5 + years of related experience

US Citizenship Required:

Yes

Job Description:

Position Title: Cyber Security Threat Hunter, Tier 3

Location: USCENTCOM MacDill AFB

Department: Cyber Security Operations Cell (CSOC)

Position Overview: The Tier 3 Cyber Security Threat Hunter is a senior-level role responsible for proactively identifying, investigating, and mitigating advanced cyber threats within the organization’s network. The ideal candidate will leverage extensive experience in threat intelligence, incident response, and security monitoring to enhance our cyber defense posture. This role requires a deep understanding of the cyber threat landscape, as well as advanced analytical, critical thinking and technical skills.

Key Responsibilities:

  • Threat Detection and Analysis: Utilize advanced tools, SIEM, SOAR, EDR and Cyber Threat Intelligence Platforms and methodologies to identify anomalies and potential threats within the organization’s systems and networks.
  • Incident Response: Lead investigations of security incidents, providing in-depth analysis and timely resolution. Collaborate with other security teams and command directorates to remediate vulnerabilities and mitigate threats.
  • Threat Intelligence: Assist in gathering and analyzing threat intelligence data from various sources to understand emerging threats and vulnerabilities. Implement IOCs into the threat intelligence platform and confer with other teams on mitigation and defense strategy. Share insights with relevant teams to enhance overall security posture.
  • Hunting Activities: Develop and execute threat-hunting strategies and hypotheses to uncover hidden threats that evade conventional security measures.
  • Tool Development: Assist in the development and implementation of automated tools and scripts to improve threat detection and response capabilities.
  • Documentation and Reporting: Maintain thorough documentation of findings, investigations, and methodologies. Present findings to stakeholders and contribute to regular security reports.
  • Collaboration: Work closely with incident response, security operations, and IT teams to improve threat detection and incident response capabilities.
  • Training and Mentorship: Provide guidance and mentorship to junior threat hunters and security analysts, fostering a culture of continuous improvement.

Qualifications:

  • Bachelor’s degree in cyber security, Information Technology, or a related field; or 10 years relevant experience in cyber security and information technology.
  • Additional Qualifications:
  • Active Top-Secret Clearance with SCI eligibility
  • Required Certifications: Sec+ or equivalent, CEH; additional certifications are a plus to include CTIA, GCIH, GCFI, CYSA, CISSP
  • Minimum of 5 years of experience in cyber security, with a focus on threat hunting.
  • Strong knowledge of attack vectors, malware analysis, and cyber threat intelligence frameworks.
  • Proficiency in using SIEM (SPLUNK/ArcSight), SOAR, End Point Detection and Response, and other security tools for threat detection and analysis.
  • Familiarity with programming/scripting languages (Python, PowerShell, etc.) to develop tools and automate tasks.
  • Excellent analytical and problem-solving skills, with the ability to think critically under pressure.
  • Strong communication skills, both verbal and written, with the ability to present complex information clearly to non-technical stakeholders to include technical writing.

Preferred Skills:

  • Experience with cloud security (AWS, Azure, GCP) and emerging technologies.
  • Knowledge of regulatory requirements and compliance frameworks (GDPR, NIST, ISO 27001).
  • Experience with threat hunting frameworks and methodologies (MITRE ATT&CK, Diamond Model, Cyber Kill Chain).

Travel Requirements:

  • Up to 50% travel may be required for USCENTCOM Partner Nation support, including OCONUS travel throughout the year.

The likely salary range for this position is $106,250 - $143,750. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.

Scheduled Weekly Hours:

40

Travel Required:

25-50%

Telecommuting Options:

Onsite

Work Location:

USA FL MacDill AFB

Additional Work Locations:

Total Rewards at GDIT:

Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.

We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 30 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.

We connect people with the most impactful client missions, creating an unparalleled work experience that allows them to see their impact every day. We create opportunities for our people to lead and learn simultaneously. From securing our nation’s most sensitive systems, to enabling digital transformation and cloud adoption, our people are the ones who make change real.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
Apply now Apply later
Job stats:  1  0  0
Category: Threat Intel Jobs

Tags: ArcSight AWS Azure CEH CISSP Clearance Cloud Compliance CSOC Cyber defense Cyber Kill Chain EDR GCIH GCP GDPR Incident response ISO 27001 Malware MITRE ATT&CK Monitoring NIST PowerShell Python Scripting SIEM SOAR Splunk Strategy Threat detection Threat intelligence Top Secret TS/SCI Vulnerabilities

Perks/benefits: 401(k) matching Career development Competitive pay Equity / stock options Health care Insurance Medical leave Parental leave

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.