Senior Cyber Threat Hunter TS/SCI (or eligible)

Vibrantz Corporation
Reston, United States of America
1 month ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Senior

Job location

Reston, United States of America

Tech stack

Software System Penetration Testing
ARM
Computer Security
Computer Networks
Elasticsearch
Intrusion Detection and Prevention
Security Information and Event Management
Software Vulnerability Management
QRadar
Azure Security Center
Information Technology
Cybercrime
Palo Alto Networks
Nessus
3-tier Architectures
Splunk
Qualys
Vulnerability Analysis

Job description

To meet growing client demand, we are continuously seeking top talent across our core competencies, building a strong pipeline of exceptional professionals ready to support current and future mission needs. Our people know they'll be doing work that matters at the heart of the national security mission, exploring new possibilities at the cutting edge of technology. They know they will be well-rewarded and recognized for their commitment. Our people know they will enjoy plentiful opportunities to grow, thrive, and have fun as a member of the Vibrint family. Join Vibrint, where your career is a priority, and your future is our shared goal. We are seeking a proactive Senior Cyber Threat Hunters to join our Cybersecurity team. As a Cyber Threat Hunter, you will play a critical role in protecting our clients' infrastructure and data by proactively hunting for and identifying potential threats and vulnerabilities. You will work closely with incident responders, security analysts, and other stakeholders to develop and implement threat hunting strategies and techniques. Must be able to obtain and maintain a federal security clearance up to TS/SCI. US citizenship is required., MANTECH seeks a motivated, career and customer-oriented Senior Budget Analyst to join our team in Arlington, VA. This is an onsite position. Responsibilities include, but are not…

  • 1 day ago

Requirements

  • Experience in a Tier 3 SOC environment, with expertise in advanced threat detection, incident response, and proactive threat hunting.
  • Proactively hunt for and identify potential threats and vulnerabilities within our clients' environments
  • Perform in-depth analysis of security logs, network traffic, and other data sources to identify indicators of compromise and suspicious activities
  • Create and maintain custom signatures, rules, and alerts to enhance detection and response capabilities
  • Develop and implement threat hunting methodologies and techniques to effectively detect and mitigate advanced cyber threats
  • Demonstrated experience in penetration testing, including identifying vulnerabilities, simulating adversarial attack techniques, and translating findings into actionable threat detection and mitigation strategies.
  • Collaborate with incident responders, security analysts, and other stakeholders to investigate and respond to security incidents
  • Stay up to date with the latest threat intelligence and security trends to continuously enhance threat hunting capabilities
  • Provide guidance and mentorship to junior members of the team

Desired Skills:

  • Advanced Threat Hunting Expertise: Proven experience conducting proactive threat hunts in Tier 3 SOC environments, leveraging tools such as Splunk, Elastic Stack, or XSIAM to detect and investigate advanced persistent threats (APTs), insider threats, and zero-day exploits
  • Technical Proficiency in Security Tooling: Hands-on experience with EDR solutions (e.g., CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint), vulnerability management tools (e.g., Nessus, Qualys, Rapid7 InsightVM), and SIEM platforms, with the ability to create custom rules, detections, and signatures to enhance visibility and response
  • Analytical and Collaborative Mindset: Strong ability to analyze complex attack patterns, correlate threat intelligence, and collaborate with incident response, forensics, and SOC teams to improve detection capabilities and strengthen overall security posture
  • Experience with Palo Alto Networks security platforms (e.g., Cortex XDR, Prisma, NGFW) is a plus, particularly for enhancing threat detection, analysis, and response capabilities., * Experience with Vulnerability Assessments: Nessus, Qualys, Rapid7 InsightVM, and OpenVAS, etc.
  • Experience with Endpoint Security (EDR): CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint, Carbon Black, etc.
  • Experience with SIEM: Splunk, XSIAM, Elastic Stack, IBM QRadar, LogRhythm, etc.
  • Experience with threat hunting tools and techniques
  • Experience conducting incident response and investigations
  • Knowledge of common cyber threats and attack vectors
  • Bachelor's degree in Computer Science or a related technical field
  • Relevant certifications such as CISSP, CISM, or GIAC certifications are preferred
  • Active Top Secret Clearance - (SCI Eligible) Preferred

Benefits & conditions

Vibrint's comprehensive compensation package includes but is not limited to: competitive salary; annual merit-based salary increase and discretionary bonus program; 401(k) plan with a company contribution; 11 paid federal holidays; 160 hours of paid time off; medical, dental, vision, life and short- & long-term disability insurance; employee assistance program; and a generous professional development allowance.

About the company

Vibrint is a trusted provider of mission-critical systems and analysis that transform our customers' capacity and capability in harvesting and harnessing data. Working alongside many of the most talented professionals in public service, we work tirelessly to create and sustain new solutions and services that meet the stringent demands across a variety of customer missions., © 2026 Careerjet All rights reserved

Apply for this position