Cyber Threat Hunter
Company | KBR |
---|---|
Location | Washington, DC, USA, Pearl Harbor, Hawaii, USA, San Antonio, TX, USA, North Charleston, SC, USA, Stuttgart, Germany |
Salary | $65200 – $209600 |
Type | Full-Time |
Degrees | Bachelor’s, Master’s |
Experience Level | Junior, Mid Level |
Requirements
- High School Diploma or GED; Experience: Two (2) years of practical experience demonstrating competency in Cybersecurity or related experience.
- Secret / Top Secret SCI clearance requirement.
- 8570 Compliant IAT 2 or 3 certification required.
- High School Diploma or GED; Experience: Two (3) years of practical experience demonstrating competency in Cybersecurity or related experience.
- Secret / Top Secret SCI clearance requirement.
- 8570 Compliant IAT 2 or 3 certification required and meet one of subsequent DoD 8140 manual of CND Auditor, CND Analyst, CNDSP Manager, CND Incident Responder, CND Infrastructure Support, IASAE I or IASAE II.
- 5+ years with a Bachelor’s degree or 7+ years with HS/GED in Cybersecurity or related experience.
- Secret / Top Secret SCI clearance requirement.
- 8570 Compliant IAT 2 or 3 certification required and meet one of subsequent DoD 8140 manual of CND Auditor, CND Analyst, CNDSP Manager, CND Incident Responder, CND Infrastructure Support, IASAE I or IASAE II.
- Bachelor’s degree in Cybersecurity or related discipline. Experience: No Experience needed.
- Secret / Top Secret SCI clearance requirement.
- 8570 Compliant IAT 2 or 3 certification required.
- Bachelor’s degree in Cybersecurity or related discipline. Experience: 3 years of professional experience in a related cybersecurity / IT Field.
- Secret / Top Secret SCI clearance requirement.
- 8570 Compliant IAT 2 or 3 certification required.
- Master’s degree in Cybersecurity or related discipline. Experience: 10 years of professional experience in a related cybersecurity / IT Field.
- Secret / Top Secret SCI clearance requirement.
- 8570 Compliant IAT 2 or 3 certification required.
Responsibilities
- Conduct proactive cyber threat hunting using open-source and classified intelligence sources.
- Analyze threat bulletins, alerts, and intelligence reports from multiple government agencies (NSA, DIA, USCYBERCOM, etc.).
- Develop custom Indicators of Compromise (IoCs) and threat detection signatures.
- Perform daily monitoring and analysis of cyber threat warnings and vulnerability reports.
- Coordinate threat intelligence activities with vulnerability management and incident response teams.
- Provide recommendations on risk mitigation strategies based on threat intelligence.
- Mentor junior analysts and contribute to cyber threat analysis training programs.
Preferred Qualifications
-
No preferred qualifications provided.