Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy, and consent to receive emails from Rise
Jobs / Job page
Sr. Forensics Analyst- Threat Hunter image - Rise Careers
Job details

Sr. Forensics Analyst- Threat Hunter

liETtVLaARqgmMEbYzHNNLIzUPcdfPrwhYtVK7Qa.png Fast Facts

Join Cybervance as a Senior Forensics Analyst-Threat Hunter in Washington, D.C., where you will lead cyber threat hunts and develop innovative solutions to enhance digital security.

liETtVLaARqgmMEbYzHNNLIzUPcdfPrwhYtVK7Qa.png Responsibilities: Identify and analyze threat tactics, conduct intelligence-based cyber threat hunts, perform forensic analysis, and create technical summaries of findings, ensuring adherence to security protocols.

liETtVLaARqgmMEbYzHNNLIzUPcdfPrwhYtVK7Qa.png Skills: Expertise in Cyber Threat Hunting, Digital Forensics, Incident Response, knowledge of the MITRE ATT&CK Framework, proficiency in forensic tools, and strong analytical skills.

liETtVLaARqgmMEbYzHNNLIzUPcdfPrwhYtVK7Qa.png Qualifications: Bachelor’s degree with 10+ years of relevant experience, active Secret clearance, and certifications in incident response and cyber forensics.

liETtVLaARqgmMEbYzHNNLIzUPcdfPrwhYtVK7Qa.png Location: Washington, DC, US

liETtVLaARqgmMEbYzHNNLIzUPcdfPrwhYtVK7Qa.png Compensation: Not provided by employer. Typical compensation ranges for this position are between $110,000 - $160,000.



Cybervance%20Logo-Small.png

Sr. Forensics Analyst-Threat Hunter

Washington, D.C.| Full-time

Cybervance is an equal opportunity employer that designs, develops, and manages the successful execution of training programs for government and private sector organizations. Cybervance believes in creating innovative solutions to deliver measured results.

We are looking for a Senior Forensics Analyst with an active Secret Clearance for an on-site team located in Washington, D.C.

Responsibilities

Responsibilities include, but are not limited to:

  • Identify threat tactics, methodologies, gaps, and shortfalls aligned with the MITRE ATT&CK Framework and the Azure Threat Research Matrix (ATRM).
  • Perform Hypothesis-based or Intelligence-based Cyber Threat Hunts to identify threats and risks within environments.
  • Use cloud-native techniques and methods to identify and create threat detections for automated response activities.
  • Use Agile methodology to organize intelligence, hunts, and project status.
  • Be able to independently research intelligence reports to find actionable data for conducting intel or hypothesis-based hunts.
  • Explore and correlate large data sets to uncover novel attack techniques, monitor and catalog changes in activity group tradecraft, and investigate alerts for enterprise customers.
  • Analyze log files, evidence, and other information to determine the best methods for identifying the perpetrator(s) of a network intrusion.
  • Confirm what is known about an intrusion and discover new information, if possible, after identifying the intrusion via dynamic analysis.
  • Create a forensically sound duplicate of the evidence (i.e., forensic image) that ensures the original evidence is not unintentionally modified, to use for data recovery and analysis processes.
  • Provide a technical summary of findings per established reporting procedures.
  • Ensure that the chain of custody is followed by all digital media acquired by the Federal Rules of Evidence.
  • Recognize and accurately report forensic artifacts indicative of a particular operating system.
  • Extract data using data carving techniques (e.g., Forensic Tool Kit [FTK], Foremost).
  • Collect and analyze intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.

Qualifications

  • Bachelor’s degree or higher
  • 10+ years of experience performing cyber threat hunting and forensics support for incident response.
  • Certifications addressing identification of malicious system and user activity, incident response in an enterprise environment, timeline artifact analysis, timeline collection, timeline processing, volatile data collection, analysis of profiling of systems and devices, analysis of file and program activity, acquisition, preparation, and preservation of digital evidence, analysis of user communications, advanced IDS concepts, applications protocols, concepts of TCP/IP and the link layer, DNS, fragmentation, IDS fundamentals and initial deployment (e.g., snort, bro), IDS rules (e.g., snort, bro), IPv6, network architecture and event correlation, network traffic analysis and forensics, or packet engineering.
  • Active Secret clearance
  • 5+ years of experience in digital forensics and incident response, and threat hunt activities.
  • Core Competencies in Computer Forensics, Computer Network Defense, Software Testing and Evaluation, System Administration, and Threat Analysis.
  • All access to classified information will be within government-controlled secure facilities.
  • Strong written and verbal communication skills.
  • Create detections and automation to detect, contain, eradicate, and recover from security threats.
  • Develop new and novel defense techniques to identify and stop advanced adversary tactics and techniques.
  • Perform forensics on network, host, memory, and other artifacts originating from multiple operating systems, applications, or networks and extract IOCs (Indicators of Compromise) and TTPs (Tactics, Techniques, and Procedures).
  • Conduct proactive hunts through enterprise networks, endpoints, or datasets to detect malicious, suspicious, or risky activities that have evaded detection by existing tools.
  • Advanced knowledge of TCP/IP networking, and network services such as DNS, SMTP, DHCP, etc.
  • Solid understanding of attacker tradecraft that is associated with email, app-based, cloud threats , and the ability to apply defensive tactics to protect against threats.
  • Advanced knowledge of operating system internals, OS security mitigations, understanding of Security challenges in Windows, Linux, Mac, Android & iOS platforms
  • Experience using forensic tools (e.g., EnCase, Sleuthkit, FTK).
  • Ability to perform deep analysis of captured malicious code (e.g., malware forensics).
  • Skill in analyzing anomalous code as malicious or benign.
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
  • Incorporate agile, threat intelligence-driven, or hypothesis-based threat hunting, and the MITRE ATT&CK framework to identify and prioritize development of missing or ineffective detection capabilities to detect, prevent, and respond to cyber events originating from threat actors.

Preferred Qualifications

  • Proficiency with at least Python, PowerShell, or bash.
  • Proficiency in using query languages used in popular SIEM products (Splunk, Sentinel).
  • Experience with producing finished intelligence content on threat actors and attacker techniques, including written reports, presentations, and visuals covering attribution, threat detection and hunting guidance, and remediation recommendations.
  • Experience conducting non-attributable research and conducting research using the deep web.
  • Preserve evidence integrity according to standard operating procedures or national standards.
  • Ability to analyze memory dumps to extract information.
  • Skill in identifying and extracting data of forensic interest in diverse media (i.e., media forensics).

Average salary estimate

$135000 / YEARLY (est.)
min
max
$110000K
$160000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

Similar Jobs

Senior Cyber Defense Analyst to perform advanced SIEM-based detection, incident response, and mentoring for Cybervance's on-site Washington, D.C. team, requiring an active Top-Secret/SCI clearance.

Senior-level incident responder with Top-Secret clearance needed to lead IR operations, guide remediation, and strengthen network security posture for the Bureau of the Census.

Posted 12 hours ago

CGS is hiring a Senior Oracle APEX Developer to build and maintain secure, workflow-centric Oracle applications and database solutions for government clients.

Senior Cybersecurity Analyst needed to lead RMF/A&A, vulnerability management, and DISA compliance for AFOSI networks at Quantico under a cleared contractor role.

Photo of the Rise User
Posted 5 hours ago

Girls Inc. is hiring an IT Operations Manager to lead and optimize their Microsoft 365 environment and IT operations, improving user experience and service delivery.

iberdrola Hybrid United States Of America, New York, Rochester
Posted 3 hours ago

Lead the design and operation of IAM and service management programs to ensure secure, compliant identity lifecycle and asset/service governance across Avangrid's operational networks.

Senior Cyber Defense Analyst to perform advanced SIEM-based detection, incident response, and mentoring for Cybervance's on-site Washington, D.C. team, requiring an active Top-Secret/SCI clearance.

Photo of the Rise User
Posted 21 hours ago

Sigma Defense is hiring a Senior Network Engineer (SIL) to design, implement, test, and support complex Cisco-based networks for DoD classified environments.

Photo of the Rise User

Experienced security engineer needed to architect and operate defenses across cloud and enterprise environments for a growth-minded industrial automation software company.

Children's Mercy seeks an Informatics Solutions Engineer to design, implement, and support EHR and clinical application integrations, with a focus on lab instrument interfaces and clinical systems.

Photo of the Rise User
Saalex Hybrid No location specified
Posted 11 hours ago

Experienced Systems Administrator needed to maintain Windows systems, networking, virtualization, and security for an onsite DoD environment at Patuxent River NAS.

Photo of the Rise User

Lead and scale Lambda's Detection & Response organization to deliver automated, enterprise-grade detection, AI-enabled hunting, and resilient incident response for a world-class AI infrastructure provider.

Photo of the Rise User
Credit Genie Hybrid No location specified
Posted 6 hours ago

A hands-on IT Operations Specialist is needed to support employees, manage devices and access, and help scale office and identity infrastructure at a fast-growing AI-driven fintech.

Photo of the Rise User
Blue Water Thinking Hybrid Fully Remote - Based in USA
Posted 11 hours ago

Blue Water Thinking is hiring an Integration Architect to lead system integration and interoperability efforts for the VA EHR Modernization program, ensuring projects meet cost, schedule, and performance goals.

EXPANSIA is hiring a senior Cybersecurity Engineer and Compliance Lead in Dayton, OH to lead RMF compliance, security control implementation, and continuous monitoring for DoD information systems.

MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
HQ LOCATION
No info
EMPLOYMENT TYPE
Full-time, remote
DATE POSTED
August 27, 2025
Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!