NASA Cyber Threat Hunt Analyst, Cyber Threat Hunt Analyst and Incident Responders

TYTON LLC
Madison, United States of America
3 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Intermediate

Job location

Madison, United States of America

Tech stack

Data analysis
Software System Penetration Testing
Information Systems
Multilayer Switch
Digital Forensics
Log Files
Network Protocols
Comptia Pentest+ CE
Reverse Engineering
Security Information and Event Management
Technical Data Management Systems
Mitre Att&ck
Malware
Cyber Threat Analysis
SC Clearance
Cyber Warfare
Splunk
SentinelOne Expertise

Job description

Location: Onsite at NASA Marshall Space Flight Center (MSFC), Huntsville, AL or NASA Johnson Space Center (JSC), Houston, TXThis position focuses on monitoring and responding to cyber incidents across networks and information systems. The role supports cyber defense operations, manages major incidents, and partners with stakeholders to improve security solutions. It also coordinates incident response actions and maintains chain-of-custody for sensitive investigations., Acts as an integral member of the threat intelligence team, evaluating the implications of emerging threats on client organizations. Responsibilities include supporting incident detection and response efforts, formulating advanced detection strategies, and delivering intelligence insights to enhance cybersecurity operations. The role requires distilling complex technical data into clear, actionable intelligence for both technical teams and executive leadership.

Requirements

  • 6+ years in cybersecurity offensive/defensive operations
  • 4+ years in APT hunting, penetration testing, digital forensics, SOC operations, or incident response
  • Experience profiling and tracking malicious actors, detecting MITRE ATT&CK TTPs, and analyzing log files
  • Bachelor's degree
  • Secret clearance required; ability to obtain and maintain TS/SCI clearance Experience with detection/alerting technologies (Splunk, Elastic, SentinelOne, etc.)
  • Forensic and data analysis, leading cyber exercises
  • Technical reporting and leadership briefings
  • IAT Level III certification (CISSP, CISM, or CISA)
  • Secret clearance required; ability to obtain and maintain TS/SCI clearance, * 3+ years in APT hunting, penetration testing, digital forensics, malware reverse engineering, SOC operations, or incident response
  • Experience with SentinelOne, Splunk, or Microsoft Defender
  • Bachelor's degree
  • OSCP, CCNA-Security, CySA+, GCIH, GICSP, PenTest+ or similar certification
  • Secret clearance required; TS/SCI clearance preferred
  • Proficiency in MITRE ATT&CK TTPs, SIEM alerts analysis, and log file review
  • Ability to work independently and manage multiple concurrent tasks, * 6+ years of cybersecurity experience
  • 4+ years in threat research associated with nation-state or criminal activities
  • Strong communication skills for technical and executive audiences
  • Experience with network protocols, SIEM, endpoint tools, and frameworks (Cyber Kill Chain, Diamond Model, MITRE ATT&CK)
  • Bachelor's degree
  • Secret clearance required; Ability to obtain and maintain Top Secret/SCI
  • Experience with intelligence community or national security
  • Familiarity with threat intelligence platforms (MISP, Mandiant, CrowdStrike, Recorded Future, etc.)
  • Industry certifications (GCIA, GCIH, GCFA, GNFA, GCTI, GREM)

About the company

TYTON LLC is a consultancy expertise delivers tailored solutions to meet client needs with missions of the greatest importance to our nation. We focus on solving complex challenges with precision and dedication, enabling customers to achieve their goals with efficiency and agility. TYTON LLC fosters a collaborative, results-driven environment, helping clients navigate and adapt to an ever-evolving landscape while maintaining security and operational integrity.

Apply for this position