user avatar

Cyber Security Threat Hunter

Crystal Clear Technologies, Inc

Yesterday
Top Secret/SCI
Mid Level Career (5+ yrs experience)
Occasional travel
IT - Security
Tampa, FL (On-Site/Office)

Position Title: Cyber Security Threat Hunter, Tier 3
Location: USCENTCOM MacDill AFB
Department: Cyber Security Operations Cell (CSOC)
Position Overview:
The Tier 3 Cyber Security Threat Hunter is a senior-level role responsible for proactively identifying, investigating, and mitigating advanced cyber threats within the organization’s network. The ideal candidate will leverage extensive experience in threat intelligence, incident response, and security monitoring to enhance our cyber defense posture. This role requires a deep understanding of the cyber threat landscape, as well as advanced analytical, critical thinking and technical skills.
Key Responsibilities:
• Threat Detection and Analysis: Utilize advanced tools, SIEM, SOAR, EDR and Cyber Threat Intelligence Platforms and methodologies to identify anomalies and potential threats within the organization’s systems and networks.

• Incident Response: Lead investigations of security incidents, providing in-depth analysis and timely resolution. Collaborate with other security teams and command directorates to remediate vulnerabilities and mitigate threats.

• Threat Intelligence: Assist in gathering and analyzing threat intelligence data from various sources to understand emerging threats and vulnerabilities. Implement IOCs into the threat intelligence platform and confer with other teams on mitigation and defense strategy. Share insights with relevant teams to enhance overall security posture.

• Hunting Activities: Develop and execute threat-hunting strategies and hypotheses to uncover hidden threats that evade conventional security measures.

• Tool Development: Assist in the development and implementation of automated tools and scripts to improve threat detection and response capabilities.

• Documentation and Reporting: Maintain thorough documentation of findings, investigations, and methodologies. Present findings to stakeholders and contribute to regular security reports.

• Collaboration: Work closely with incident response, security operations, and IT teams to improve threat detection and incident response capabilities.

• Training and Mentorship: Provide guidance and mentorship to junior threat hunters and security analysts, fostering a culture of continuous improvement.
Qualifications:
• Bachelor’s degree in cyber security, Information Technology, or a related field; or 10 years relevant experience in cyber security and information technology.
· Additional Qualifications:
• Active Top-Secret Clearance with SCI eligibility

• Required Certifications: 8570 Compliance; additional certifications are a plus to include CTIA, GCIH, GCFI, CYSA, CISSP

• Minimum of 5 years of experience in cyber security, with a focus on threat hunting.

• Strong knowledge of attack vectors, malware analysis, and cyber threat intelligence frameworks including the MITRE ATT&CK framework to enhance threat detection, response capabilities, and alignment with organizational security strategies.

• Proficiency in using SIEM (SPLUNK/ArcSight), SOAR, End Point Detection and Response, and other security tools for threat detection and analysis.

• Familiarity with programming/scripting languages (Python, PowerShell, and Bash.) to develop tools and automate tasks.

• Excellent analytical and problem-solving skills, with the ability to think critically under pressure. Some public speaking may be involved to present your findings.

• Strong communication skills, both verbal and written, with the ability to present complex information clearly to non-technical stakeholders to include technical writing.
Preferred Skills:
• Experience with cloud security (AWS, Azure, GCP) and emerging technologies.

• Knowledge of AI Development and AI Prompt Engineering/Prompt Injection. Knowledge of generative AI and agentic AI for use in automation and processes.

• Knowledge of regulatory requirements and compliance frameworks (GDPR, NIST, ISO 27001).

• Experience with threat hunting frameworks and methodologies (MITRE ATT&CK, Diamond Model, Cyber Kill Chain).

• Familiarity with Docker and Containerization.

• Familiarity with virtual environments configurations and usages.

• Familiarity with the interpretation of Cyber Security event categorization through analysis and coordination of incoming data flow from security devices or other means, track anomalies or threat indicators, as required.

• Familiarity with Microsoft Office tools. Microsoft and Linux operating systems, Sharepoint.
Travel Requirements:
· Up to 10% travel may be required for contingency operations, including OCONUS, if required.
group id: 10354784
N
Name HiddenRecruiter
Find Crystal Clear Technologies, Inc on Social Media
Network Employers
user avatar
About Us
Crystal Clear Technologies, Inc. was founded in 2002 with the primary goal of serving those who serve. CCT is a Woman-Owned Small Business, designed to support the mission critical requirements of the DoD. We understand the importance of budgets and time crucial deadlines and specialize in a turn-key approach in designing and implementing the solutions of our Federal, State and local government clients. We offer extensive knowledge in procurement policies and are known for providing our clients with strategic advice on all aspects of the government contracting process.

Crystal Clear Technologies, Inc Jobs


Job Category
IT - Security
Clearance Level
Top Secret/SCI