SOC Threat Hunt Specialist with Security Clearance



Our client has 2 openings for a SOC Threat Hunt Specialist This is 100% Remote Candidates must be US Citizens and hold a Public Trust security clearance. The Role: • Understand and utilize Threat Intelligence in the creation, planning, and leading of Threat Hunt actions.
• Collaborate with cross-functional teams including network, endpoint, security, and IT operations to understand and translate customer requirements and expectations into actionable plans.
• Develop and maintain detailed documentation of SOC design, architecture, and processes for client reference. • Provide training and support to SOC analysts and other team members on the use of tools, processes, and procedures.
• Assist in the creation of incident response plans, threat management processes, and security policies in alignment with client requirements.
• Stay up-to-date with the latest cybersecurity trends, threat intelligence, and best practices to ensure SOC is well equipped to response to emerging threats.
• Participate in continuous improvement initiatives to enhance the effectiveness and efficiency of the SOC.
• Assist in incident response actions when required.
• Strong analytical and problem-solving skills with the ability to think critically and adapt to evolving situations.
• Excellent communication skills with the ability to effectively convey technical information to both technical and non-technical audiences. What Sets You Apart:
• A Bachelor’s degree or minimum of 4 years prior relevant experience.
• Ability to obtain public trust clearance.
• In-depth knowledge of MS Sentinel.
• Experience configuring log sources, normalizing data, and managing threat intelligence feeds.
• Strong understanding of threat detection, incident response, and SOAR concepts.
• Excellent communication and interpersonal skills to effectively collaborate with stakeholders.
• Ability to work independently and as part of a team. Preferred:
• Understanding of M-21-31 requirements, NIST Cybersecurity Framework, CISA Incident and Vulnerability Playbooks, and CISA BOD requirements such as BOD 22-01.
• Understanding of a variety of both network and end point defenses.
• Experience developing Threat Hunt action planning and Incident Response.
• Experience configuring UEBA to enhance the SOC’s ability to identify anomalous behaviors.
• Experience using python and AI/ML frameworks for cyber analytics.
• Experience establishing effective SOC metrics, alarms, reports and dashboards.
• Experience with security aspects of M365, Azure, the use of ServiceNow and ServiceNow workflows, and CISA CDM tools.
• Relevant certifications such as Microsoft SC-200.

To apply for this job please visit