Vibrint
Cyber Threat Hunter - TS/SCI (Reston, VA)
1 day ago – Be among the first 25 applicants.
Get AI-powered advice on this job and more exclusive features.
Vibrint is a trusted provider of mission‑critical systems and analysis that transform our customers’ capacities and capabilities in harvesting and harnessing data. Working alongside many of the most talented professionals in public service, we work tirelessly to create and sustain new solutions and services that meet the stringent demands across a variety of customer missions.
Our people know they will be doing work that matters at the heart of the national security mission, exploring new possibilities at the cutting edge of technology. They know they will be well‑rewarded and recognized for their commitment and will enjoy plentiful opportunities to grow, thrive, and have fun as a member of the Vibrint family. Join Vibrint, where your career is a priority and your future is our shared goal.
Role Overview We are seeking a proactive Cyber Threat Hunter to join our Cybersecurity team. As a Cyber Threat Hunter, you will protect our clients’ infrastructure and data by proactively hunting for and identifying potential threats and vulnerabilities. You will work closely with incident responders, security analysts, and other stakeholders to develop and implement threat hunting strategies and techniques.
Must have an active TS/SCI security clearance. U.S. citizenship is required.
Required Skills
Experience in a Tier 3 SOC environment, with expertise in advanced threat detection, incident response, and proactive threat hunting.
Proactively hunt for and identify potential threats and vulnerabilities within our clients’ environments.
Perform in‑depth analysis of security logs, network traffic, and other data sources to identify indicators of compromise and suspicious activities.
Create and maintain custom signatures, rules, and alerts to enhance detection and response capabilities.
Develop and implement threat hunting methodologies and techniques to effectively detect and mitigate advanced cyber threats.
Collaborate with incident responders, security analysts, and other stakeholders to investigate and respond to security incidents.
Stay up to date with the latest threat intelligence and security trends to continuously enhance threat hunting capabilities.
Provide guidance and mentorship to junior members of the team.
Desired Skills
Advanced Threat Hunting Expertise: Proven experience conducting proactive threat hunts in Tier 3 SOC environments, leveraging tools such as Splunk, Elastic Stack, or XSIAM to detect and investigate advanced persistent threats (APTs), insider threats, and zero‑day exploits.
Technical Proficiency in Security Tooling: Hands‑on experience with EDR solutions (e.g., CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint), vulnerability management tools (e.g., Nessus, Qualys, Rapid7 InsightVM), and SIEM platforms, with the ability to create custom rules, detections, and signatures to enhance visibility and response.
Analytical and Collaborative Mindset: Strong ability to analyze complex attack patterns, correlate threat intelligence, and collaborate with incident response, forensics, and SOC teams to improve detection capabilities and strengthen overall security posture.
Qualifications
Experience with Vulnerability Assessments: Nessus, Qualys, Rapid7 InsightVM, OpenVAS, and similar tools.
Experience with Endpoint Security (EDR): CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint, Carbon Black, etc.
Experience with SIEM: Splunk, XSIAM, Elastic Stack, IBM QRadar, LogRhythm, etc.
Experience with threat hunting tools and techniques.
Experience conducting incident response and investigations.
Knowledge of common cyber threats and attack vectors.
Bachelor’s degree in Computer Science or a related technical field.
Relevant certifications such as CISSP, CISM, or GIAC certifications are preferred.
Active TS/SCI clearance.
Compensation Package Vibrint’s comprehensive compensation package includes a competitive salary, annual merit‑based increases, a discretionary bonus program, a 401(k) plan with company contribution, 11 paid federal holidays, 160 hours of paid time off, medical, dental, vision, life and short‑ & long‑term disability insurance, an employee assistance program, and a generous professional development allowance.
Equal Opportunity Employer All applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, citizenship, family structure, marital status, disability, veteran or military status, or any other characteristic protected by law in all phases of the employment process and in compliance with applicable federal, state, and local laws and regulations.
Please apply for immediate consideration.
#J-18808-Ljbffr
Vibrint is a trusted provider of mission‑critical systems and analysis that transform our customers’ capacities and capabilities in harvesting and harnessing data. Working alongside many of the most talented professionals in public service, we work tirelessly to create and sustain new solutions and services that meet the stringent demands across a variety of customer missions.
Our people know they will be doing work that matters at the heart of the national security mission, exploring new possibilities at the cutting edge of technology. They know they will be well‑rewarded and recognized for their commitment and will enjoy plentiful opportunities to grow, thrive, and have fun as a member of the Vibrint family. Join Vibrint, where your career is a priority and your future is our shared goal.
Role Overview We are seeking a proactive Cyber Threat Hunter to join our Cybersecurity team. As a Cyber Threat Hunter, you will protect our clients’ infrastructure and data by proactively hunting for and identifying potential threats and vulnerabilities. You will work closely with incident responders, security analysts, and other stakeholders to develop and implement threat hunting strategies and techniques.
Must have an active TS/SCI security clearance. U.S. citizenship is required.
Required Skills
Experience in a Tier 3 SOC environment, with expertise in advanced threat detection, incident response, and proactive threat hunting.
Proactively hunt for and identify potential threats and vulnerabilities within our clients’ environments.
Perform in‑depth analysis of security logs, network traffic, and other data sources to identify indicators of compromise and suspicious activities.
Create and maintain custom signatures, rules, and alerts to enhance detection and response capabilities.
Develop and implement threat hunting methodologies and techniques to effectively detect and mitigate advanced cyber threats.
Collaborate with incident responders, security analysts, and other stakeholders to investigate and respond to security incidents.
Stay up to date with the latest threat intelligence and security trends to continuously enhance threat hunting capabilities.
Provide guidance and mentorship to junior members of the team.
Desired Skills
Advanced Threat Hunting Expertise: Proven experience conducting proactive threat hunts in Tier 3 SOC environments, leveraging tools such as Splunk, Elastic Stack, or XSIAM to detect and investigate advanced persistent threats (APTs), insider threats, and zero‑day exploits.
Technical Proficiency in Security Tooling: Hands‑on experience with EDR solutions (e.g., CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint), vulnerability management tools (e.g., Nessus, Qualys, Rapid7 InsightVM), and SIEM platforms, with the ability to create custom rules, detections, and signatures to enhance visibility and response.
Analytical and Collaborative Mindset: Strong ability to analyze complex attack patterns, correlate threat intelligence, and collaborate with incident response, forensics, and SOC teams to improve detection capabilities and strengthen overall security posture.
Qualifications
Experience with Vulnerability Assessments: Nessus, Qualys, Rapid7 InsightVM, OpenVAS, and similar tools.
Experience with Endpoint Security (EDR): CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint, Carbon Black, etc.
Experience with SIEM: Splunk, XSIAM, Elastic Stack, IBM QRadar, LogRhythm, etc.
Experience with threat hunting tools and techniques.
Experience conducting incident response and investigations.
Knowledge of common cyber threats and attack vectors.
Bachelor’s degree in Computer Science or a related technical field.
Relevant certifications such as CISSP, CISM, or GIAC certifications are preferred.
Active TS/SCI clearance.
Compensation Package Vibrint’s comprehensive compensation package includes a competitive salary, annual merit‑based increases, a discretionary bonus program, a 401(k) plan with company contribution, 11 paid federal holidays, 160 hours of paid time off, medical, dental, vision, life and short‑ & long‑term disability insurance, an employee assistance program, and a generous professional development allowance.
Equal Opportunity Employer All applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, citizenship, family structure, marital status, disability, veteran or military status, or any other characteristic protected by law in all phases of the employment process and in compliance with applicable federal, state, and local laws and regulations.
Please apply for immediate consideration.
#J-18808-Ljbffr