- Leidos (Ashburn, VA)
- **Description** Leidos has an immediate need for a Cyber Threat Hunter to join our NOSC Cyber Team. The ideal Cyber Threat Hunter is someone who is ... any suspected and confirmed security violations. Primary Responsibilities: + Create Threat Models to better understand the DHS IT Enterprise, identify defensive… more
- Leidos (Camp Springs, MD)
- **Description** Leidos Digital Modernization sector has a career opportunity for a **_Cyber Threat Hunter Log Analyst Team Lead_** to support the Air Force ... and meaningful career, share your resume with us today! The **_Cyber Threat Hunter Log Analyst Team Lead_** is responsible for overseeing the testing,… more
- Axxum Technologies (Washington, DC)
- As a Senior Threat Hunter you will be responsible for participating in threat actor-based investigations, creating new detection methodologies, and provided ... reports for internal SOC consumption and delivery to management. + Track threat actors and associated tactics, techniques, and procedures (TTPs). + Capture… more
- ManTech (Herndon, VA)
- …Currently, ManTech is seeking a motivated, career and customer-oriented **Senior** **Cybersecurity Threat Hunter ** to join our team in the Washington DC ... anomalies and indicators of compromise (IOCs). + Develop and implement threat hunting methodologies, techniques, and tools to improve detection capabilities. +… more
- Bluehawk LLC (Fort Belvoir, VA)
- …by managing technical, schedule, and cost performance. As a Bluehawk Counter Threat Network Intelligence Analyst, you will provide embedded and reach back support ... Emerging Threats efforts and operations executed by the Defense Threat Reduction Agency (DTRA) and its partners. You will...Google Earth. + Expert Understanding of Babel Street, Berber Hunter , Data Miner, PiX, Silo, and Dun & Bradstreet… more
- Bluehawk LLC (Reston, VA)
- …You will assist in developing processes that enhance SOF situational understanding of threat networks (such as WMD, VEOs, IEDs) and enabling DOD, IA, and IC ... with fusing operations and intelligence information to enhance their effectiveness against threat networks. Using expertise in HUMINT, SIGINT, OSINT, and GEOINT you… more