Logo
Vibrint

Cleared Cyber Threat Hunter - (TS/SCI) Sterling, VA

Vibrint, Sterling, Virginia, United States, 22170

Save Job

Vibrint is a trusted provider of mission-critical systems and analysis that transform our customers' capacity and capability in harvesting and harnessing data. Working alongside many of the most talented professionals in public service, we work tirelessly to create and sustain new solutions and services that meet the stringent demands across a variety of customer missions.

We are seeking a proactive Cyber Threat Hunter to join our Cybersecurity team. As a Cyber Threat Hunter, you will play a critical role in protecting our clients' infrastructure and data by proactively hunting for and identifying potential threats and vulnerabilities. You will work closely with incident responders, security analysts, and other stakeholders to develop and implement threat hunting strategies and techniques.

Responsibilities:

Experience in a Tier 3 SOC environment, with expertise in advanced threat detection, incident response, and proactive threat hunting. Proactively hunt for and identify potential threats and vulnerabilities within our clients' environments Perform in-depth analysis of security logs, network traffic, and other data sources to identify indicators of compromise and suspicious activities Create and maintain custom signatures, rules, and alerts to enhance detection and response capabilities Develop and implement threat hunting methodologies and techniques to effectively detect and mitigate advanced cyber threats Collaborate with incident responders, security analysts, and other stakeholders to investigate and respond to security incidents Stay up to date with the latest threat intelligence and security trends to continuously enhance threat hunting capabilities Provide guidance and mentorship to junior members of the team Qualifications:

Experience with Vulnerability Assessments: Nessus, Qualys, Rapid7 InsightVM, and OpenVAS, etc. Experience with Endpoint Security (EDR): CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint, Carbon Black, etc. Experience with SIEM: Splunk, XSIAM, Elastic Stack, IBM QRadar, LogRhythm, etc. Experience with threat hunting tools and techniques Experience conducting incident response and investigations Knowledge of common cyber threats and attack vectors Bachelor's degree in Computer Science or a related technical field Relevant certifications such as CISSP, CISM, or GIAC certifications are preferred Active Top Secret Clearance - (SCI Eligible) Preferred