JobTarget Logo

AOUSC - Cyber Threat Intelligence & Threat Hunting Lead in Washington, District of Columbia at cFocus Software Incorporated

NewJob Function: Admin/Clerical/SecretarialEmployment Type: Full-Time
cFocus Software Incorporated
Washington, District of Columbia, 20001, United States
Posted on
New job! Apply early to increase your chances of getting hired.

Explore Related Opportunities

Job Description

Position Title
Cyber Threat Intelligence & Threat Hunting Lead
Position Overview
The Cyber Threat Intelligence & Threat Hunting Lead will oversee integrated cyber threat intelligence (CTI), detection engineering, and proactive threat hunting operations supporting enterprise cyber defense missions.
The Lead will drive development of intelligence-driven detections, hunt methodologies, adversary tracking, SIEM content engineering, and operational threat-informed defense capabilities.
Key Responsibilities
  • Lead CTI, detection engineering, and threat hunting operations.
  • Develop intelligence-driven detection and hunt strategies.
  • Produce operational and strategic threat intelligence reporting.
  • Develop and maintain:
    • SIEM detections,
    • analytics,
    • correlation rules,
    • behavioral detections,
    • and hunt playbooks.
  • Conduct hypothesis-based threat hunting aligned to:
    • MITRE ATT&CK,
    • adversary TTPs,
    • malware campaigns,
    • and emerging threats.
  • Integrate CTI into SOC workflows, detection engineering, and incident response operations.
  • Analyze:
    • malware trends,
    • adversary infrastructure,
    • campaigns,
    • indicators,
    • and attack patterns.
  • Support automation and SOAR integration initiatives.
  • Brief executives and technical leadership on emerging threats and operational risk.
Required Qualifications
  • 10+ years of cybersecurity operations experience.
  • 5+ years supporting CTI, threat hunting, or detection engineering programs.
  • Experience with:
    • Splunk,
    • Sentinel,
    • CrowdStrike,
    • EDR telemetry,
    • detection content engineering,
    • and intelligence platforms.
  • Strong understanding of:
    • MITRE ATT&CK,
    • adversary tradecraft,
    • malware analysis,
    • and intelligence analysis methodologies.
  • Experience developing:
    • SIEM detections,
    • hunt analytics,
    • detection tuning,
    • and operational reporting.
Preferred Certifications
  • GCTI
  • GCFA
  • GCIH
  • GMON
  • GCDA
  • CISSP
  • Splunk Security certifications

Job Location

Washington, District of Columbia, 20001, United States

Frequently asked questions about this position

Similar Jobs In Washington, District of Columbia

Hot Job

Senior Cyber Security Analyst (TS Clearance with SCI Eligibility)

JFL Consulting LLC
Washington, District of Columbia
Hot Job

SAP S/4 HANA Business Systems Analyst

Fairfax Water
Fairfax, Virginia

Functional Analyst (Medicaid Investigation)

General Dynamics Information Technology
Silver Spring, Maryland

Information Technology/Assurance (IT/IA) Specialist II

General Dynamics Information Technology
Washington, District of Columbia
New

Cyber SOC Incident Detector (MIDS Shift) - TS/SCI with Polygraph

General Dynamics Information Technology
Reston, Virginia

Apply NowYour application goes straight to the hiring team