- Leidos (Ashburn, VA)
- **Description** Leidos has an immediate need for a Cyber Threat Hunter to join our NOSC Cyber Team. The ideal Cyber Threat Hunter is someone who is ... any suspected and confirmed security violations. Primary Responsibilities: + Create Threat Models to better understand the DHS IT Enterprise, identify defensive… more
- Capital One (Mclean, VA)
- Center 3 (19075), United States of America, McLean, Virginia Senior Cyber Threat Hunter The Cyber Hunt Team at Capital One is responsible for performing ... teams to improve our detection capabilities and security controls. As a Threat Hunter , you will be responsible for proactively hunting for threats, providing… more
- ManTech (Herndon, VA)
- …Currently, ManTech is seeking a motivated, career and customer-oriented **Mid-level** **Cybersecurity Threat Hunter ** to join our team in the Washington DC ... anomalies and indicators of compromise (IOCs). + Develop and implement threat hunting methodologies, techniques, and tools to improve detection capabilities. +… more
- Axxum Technologies (Mclean, VA)
- As Threat Hunter you will be responsible for participating in threat actor-based investigations, creating new detection methodologies, and provided expert ... reports for internal SOC consumption and delivery to management. + Track threat actors and associated tactics, techniques, and procedures (TTPs). + Capture… more
- Bluehawk LLC (Fort Belvoir, VA)
- …by managing technical, schedule, and cost performance. As a Bluehawk Counter Threat Network Intelligence Analyst, you will provide embedded and reach back support ... Emerging Threats efforts and operations executed by the Defense Threat Reduction Agency (DTRA) and its partners. You will...Google Earth. + Expert Understanding of Babel Street, Berber Hunter , Data Miner, PiX, Silo, and Dun & Bradstreet… more
- Bluehawk LLC (Reston, VA)
- …You will assist in developing processes that enhance SOF situational understanding of threat networks (such as WMD, VEOs, IEDs) and enabling DOD, IA, and IC ... with fusing operations and intelligence information to enhance their effectiveness against threat networks. Using expertise in HUMINT, SIGINT, OSINT, and GEOINT you… more