AOUSC - Cyber Threat Intelligence & Threat Hunting Lead in Washington, District of Columbia at cFocus Software Incorporated
NewJob Function: Admin/Clerical/SecretarialEmployment Type: Full-Time
cFocus Software Incorporated
Washington, District of Columbia, 20001, United States
Posted on
New job! Apply early to increase your chances of getting hired.
Explore Related Opportunities
Computer and Information Analysts jobs near me in Washington, D.C.Jobs near me in Washington, D.C.Computer and Information Analysts jobs
Job Description
Position Title
Cyber Threat Intelligence & Threat Hunting Lead
Position Overview
The Cyber Threat Intelligence & Threat Hunting Lead will oversee integrated cyber threat intelligence (CTI), detection engineering, and proactive threat hunting operations supporting enterprise cyber defense missions.
The Lead will drive development of intelligence-driven detections, hunt methodologies, adversary tracking, SIEM content engineering, and operational threat-informed defense capabilities.
Key Responsibilities
Cyber Threat Intelligence & Threat Hunting Lead
Position Overview
The Cyber Threat Intelligence & Threat Hunting Lead will oversee integrated cyber threat intelligence (CTI), detection engineering, and proactive threat hunting operations supporting enterprise cyber defense missions.
The Lead will drive development of intelligence-driven detections, hunt methodologies, adversary tracking, SIEM content engineering, and operational threat-informed defense capabilities.
Key Responsibilities
- Lead CTI, detection engineering, and threat hunting operations.
- Develop intelligence-driven detection and hunt strategies.
- Produce operational and strategic threat intelligence reporting.
- Develop and maintain:
- SIEM detections,
- analytics,
- correlation rules,
- behavioral detections,
- and hunt playbooks.
- Conduct hypothesis-based threat hunting aligned to:
- MITRE ATT&CK,
- adversary TTPs,
- malware campaigns,
- and emerging threats.
- Integrate CTI into SOC workflows, detection engineering, and incident response operations.
- Analyze:
- malware trends,
- adversary infrastructure,
- campaigns,
- indicators,
- and attack patterns.
- Support automation and SOAR integration initiatives.
- Brief executives and technical leadership on emerging threats and operational risk.
- 10+ years of cybersecurity operations experience.
- 5+ years supporting CTI, threat hunting, or detection engineering programs.
- Experience with:
- Splunk,
- Sentinel,
- CrowdStrike,
- EDR telemetry,
- detection content engineering,
- and intelligence platforms.
- Strong understanding of:
- MITRE ATT&CK,
- adversary tradecraft,
- malware analysis,
- and intelligence analysis methodologies.
- Experience developing:
- SIEM detections,
- hunt analytics,
- detection tuning,
- and operational reporting.
- GCTI
- GCFA
- GCIH
- GMON
- GCDA
- CISSP
- Splunk Security certifications
Scan to Apply
Just scan this QR code to apply from your phone.
Job Location
Washington, District of Columbia, 20001, United States
Frequently asked questions about this position
Similar Jobs In Washington, District of Columbia
Hot Job
SAP S/4 HANA Business Systems Analyst
Fairfax Water
Fairfax, Virginia
Hot Job
Senior Cyber Security Analyst (TS Clearance with SCI Eligibility)
JFL Consulting LLC
Washington, District of Columbia
IT Risk and Compliance Analyst
Berkeley Research Group, LLC
Washington, District of Columbia
Informaticist
Inovalon
Bowie, Maryland
Senior Security Control Assessor (TS/SCI #26-067)
Strategic Analysis, Inc.
Arlington, Virginia
Apply NowYour application goes straight to the hiring team
By submitting your application, you understand and agree to JobTarget's
Terms of Use and
Privacy Policy.