Logo
job logo

Threat Hunting Analyst

Aretec, Inc., Washington, District of Columbia, United States


Threat Hunting Analyst – Cyber Security Specialist II (T&M) What We're Looking For We are seeking Threat Hunting Analysts – Cyber Security Specialist II (T&M) who will play a pivotal role in strengthening our Security Operations Center (SOC) capabilities at Stennis Space Center or through approved telework. In this role, you'll use advanced detection, forensics, and incident response expertise to identify sophisticated threats and protect critical federal systems.

Your Responsibilities

Leading Innovative Cybersecurity Initiatives : Proactively hunt for anomalous behavior, adversary techniques, and emerging threats using advanced detection platforms and methodologies.

Collaborative Security Operation Support : Work alongside SOC analysts, forensic specialists, incident responders, and federal stakeholders to improve detection, response, and cyber defense operations.

Strategic Cyber Threat Analysis : Analyze threat actor behaviors, TTPs, and indicators of compromise to inform enterprise defensive strategy and security posture.

Engagement & Communication : Communicate findings, risks, and recommended mitigations to technical and non-technical stakeholders. Provide actionable intelligence that enhances mission success.

Required Certifications Each Threat Hunting Analyst must hold and maintain at least two active certifications, including but not limited to: Security+, GCIH, ISC2 CISSP, GSE, GREM, GAWN, GCIA, GPPA, GSEC, GCED, GSLC, GSNA, GCFA, or other comparable certifications approved in advance by the Security Operations Branch PM.

Required Experience

BA/BS or minimum three years of experience in forensics and incident response

Minimum two years of experience with Splunk, Wireshark, or comparable tools (approval required by Security Operations Branch PM on a case‑by‑case basis)

Security Clearance Requirements

Ability to attain a Final TOP SECRET/SCI Clearance

Must meet SCI eligibility (ICD 704) with no waivers or conditions

Must be a sole U.S. Citizen under federal contract requirements

Core Competencies

Advanced analytical skills to investigate complex attacks and anomalies

Technical expertise across threat hunting, malware analysis, packet analysis, and enterprise logging

Strong communication skills to clearly articulate findings

Leadership and collaboration skills to work in fast-paced cyber environments

Commitment to supporting critical federal missions and national security

Expectation Timeline Day One

Orientation to Aretec, mission goals, and SOC operations

Begin access process for clearance and technical systems

Meet team members, leadership, and federal stakeholders

Day Thirty

Begin actively participating in threat hunts and investigations

Understand environment topology, logging sources, and detection use cases

Demonstrate familiarity with required tools (Splunk, Wireshark, etc.)

Day Sixty

Take ownership of assigned hunts or analytic areas

Contribute to strategic threat detection enhancements

Support incident response through findings and forensics insights

Day Ninety

Lead complex threat hunts and investigations.

Develop new detection logic, SOPs, and process improvements.

Mentor junior analysts and contribute to continuous SOC maturity.

#J-18808-Ljbffr