The Threat Hunting Analyst III is a senior position that provides strategic guidance and tactical implementation to fortify the organization's elite cyber defense capabilities. Their role entails designing, implementing, and sustaining security operations, as well as collaborating with internal and external hunt groups. They provide strategic direction and tactical guidance to cyber hunters and leadership based on up-to-date threat intelligence and trends, coordinating hunt activities with different internal and external teams to ensure a comprehensive and cohesive approach. They investigate, respond to, and neutralize advanced persistent threats (APTs) that may pose a significant risk to the organization's networks. Through thorough analysis of network and host activity, they identify both successful and unsuccessful intrusions carried out by advanced adversaries. To counter dynamic threats, the Threat Hunting Analyst III develops and implements custom signatures, using the latest threat information obtained from multiple sources to proactively mitigate risks. Additionally, they conduct malware analysis to create custom signatures based on samples obtained during investigations or hunts. They produce comprehensive reports that maintain situational awareness, track trends, and provide valuable insights into all relevant activities and incidents. They identify intrusion campaigns, threat actors, and nation-state organizations, allowing them to piece together the tactics and motives behind these sophisticated attacks. They actively manage and share intelligence on APT adversary groups and collaborate with the intelligence community to coordinate and exchange information regarding possible security incidents. They continuously monitor the current security threat level by analyzing internet postings, intelligence reports, and related documents. The Threat Hunting Analyst III also plays a leadership role where they oversee and mentor subordinate staff, providing guidance and support as they carry out their duties within the project and ICON Innovation Collaborative (IIC) teams.
Responsibilities\:
Lead efforts in designing, implementing, and sustaining security operations, as well as collaborating with internal and external hunt groups. Provide strategic direction and tactical guidance to cyber hunters and leadership based on up-to-date threat intelligence and trends, coordinating hunt activities with different internal and external teams to ensure a comprehensive and cohesive approach. Investigate, respond to, and neutralize advanced persistent threats (APTs) that may pose a significant risk to the organization's networks Maintain a positive attitude and work as a member of a cohesive team as well as independently. Interact with all levels of the organization in a professional, diplomatic, and tactful way. Multi-task efficiently and work in a fast pace environment on multiple projects. Perform all other duties as assigned.This position is contingent upon award
*The Threat Hunting Analyst III is a senior position that provides strategic guidance and tactical implementation to fortify the organization's elite cyber defense capabilities. Their role entails designing, implementing, and sustaining security operations, as well as collaborating with internal and external hunt groups. They provide strategic direction and tactical guidance to cyber hunters and leadership based on up-to-date threat intelligence and trends, coordinating hunt activities with different internal and external teams to ensure a comprehensive and cohesive approach. They investigate, respond to, and neutralize advanced persistent threats (APTs) that may pose a significant risk to the organization's networks. Through thorough analysis of network and host activity, they identify both successful and unsuccessful intrusions carried out by advanced adversaries. To counter dynamic threats, the Threat Hunting Analyst III develops and implements custom signatures, using the latest threat information obtained from multiple sources to proactively mitigate risks. Additionally, they conduct malware analysis to create custom signatures based on samples obtained during investigations or hunts. They produce comprehensive reports that maintain situational awareness, track trends, and provide valuable insights into all relevant activities and incidents. They identify intrusion campaigns, threat actors, and nation-state organizations, allowing them to piece together the tactics and motives behind these sophisticated attacks. They actively manage and share intelligence on APT adversary groups and collaborate with the intelligence community to coordinate and exchange information regarding possible security incidents. They continuously monitor the current security threat level by analyzing internet postings, intelligence reports, and related documents. The Threat Hunting Analyst III also plays a leadership role where they oversee and mentor subordinate staff, providing guidance and support as they carry out their duties within the project and ICON Innovation Collaborative (IIC) teams.
Responsibilities\:
Lead efforts in designing, implementing, and sustaining security operations, as well as collaborating with internal and external hunt groups. Provide strategic direction and tactical guidance to cyber hunters and leadership based on up-to-date threat intelligence and trends, coordinating hunt activities with different internal and external teams to ensure a comprehensive and cohesive approach. Investigate, respond to, and neutralize advanced persistent threats (APTs) that may pose a significant risk to the organization's networks Maintain a positive attitude and work as a member of a cohesive team as well as independently. Interact with all levels of the organization in a professional, diplomatic, and tactful way. Multi-task efficiently and work in a fast pace environment on multiple projects. Perform all other duties as assigned.This position is contingent upon award
*Clearance Required\:
Active TS-SCI Clearance with polyMinimum Education\:
Bachelor's degree in Electrical Engineering, Computer Engineering, Computer Science, or other closely related IT discipline.Minimum Years of Experience\:
Nine (9) years of position specific relevant position experience.Preferred\:
DoD 8570 Fully Compliant with formal Computing Environment certification (i.e. CCNA, CCNP, VCP-CTA, VCP-DCV, VCP-NX, Microsoft, Linux, ect.) Demonstrated skills and expertise in the following technologies\: SQL/XSQL Server Administrator (SA), Microsoft O/S and security, Information Assurance (IA), IP Data Networking and Vulnerability Assessment product engineering and design, IP network vulnerability scanner Tier 3 support, REM 3.X / Retina 5.X and greater, ACAS Security Center 4.X / Nessus 5.X or greater and HP Tenable Nessus products Currently active process improvement certification (e.g., Certified CMMI Associate, Lean Six Sigma Green Belt or above, PMI PMP, ITIL, etc.)#javelin
Pay Transparency Verbiage
Our health and welfare benefits are designed to invest in you and in the things you care about. Your health. Your well-being. Your security. Your future. Eligible employees and their dependents may elect medical, dental, vision, and basic life insurance. Employees are able to enroll in our company’s 401k plan, and, if eligible, a deferred compensation plan and Executive Deferral Plan. Employees will also receive 17 days of vacation per year, seven paid holidays, plus floating holidays and caregiver leave. Hired applicants will be able to purchase company stock and have the opportunity to receive a performance discretionary bonus.
The base salary range for this position is $167K to $180K. This range reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training.
*Clearance Required\:
Active TS-SCI Clearance with polyMinimum Education\:
Bachelor's degree in Electrical Engineering, Computer Engineering, Computer Science, or other closely related IT discipline.Minimum Years of Experience\:
Nine (9) years of position specific relevant position experience.Preferred\:
DoD 8570 Fully Compliant with formal Computing Environment certification (i.e. CCNA, CCNP, VCP-CTA, VCP-DCV, VCP-NX, Microsoft, Linux, ect.) Demonstrated skills and expertise in the following technologies\: SQL/XSQL Server Administrator (SA), Microsoft O/S and security, Information Assurance (IA), IP Data Networking and Vulnerability Assessment product engineering and design, IP network vulnerability scanner Tier 3 support, REM 3.X / Retina 5.X and greater, ACAS Security Center 4.X / Nessus 5.X or greater and HP Tenable Nessus products Currently active process improvement certification (e.g., Certified CMMI Associate, Lean Six Sigma Green Belt or above, PMI PMP, ITIL, etc.)#javelin
Pay Transparency Verbiage
Our health and welfare benefits are designed to invest in you and in the things you care about. Your health. Your well-being. Your security. Your future. Eligible employees and their dependents may elect medical, dental, vision, and basic life insurance. Employees are able to enroll in our company’s 401k plan, and, if eligible, a deferred compensation plan and Executive Deferral Plan. Employees will also receive 17 days of vacation per year, seven paid holidays, plus floating holidays and caregiver leave. Hired applicants will be able to purchase company stock and have the opportunity to receive a performance discretionary bonus.
The base salary range for this position is $167K to $180K. This range reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training.
*Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran’s status, ancestry, sexual orientation, gender identity, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal EEO laws and supplemental language at EEO including Disability/Protected Veterans and Labor Laws Posters.