Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy, and consent to receive emails from Rise
Jobs / Job page
Sr. Security Engineer - Cyber Threat Mitigation Lead image - Rise Careers
Job details

Sr. Security Engineer - Cyber Threat Mitigation Lead

liETtVLaARqgmMEbYzHNNLIzUPcdfPrwhYtVK7Qa.png Fast Facts

Cybervance is seeking a Senior Security Engineer to lead a cross-functional team in Cyber Threat Mitigation, focusing on threat intelligence and incident response for a US Government agency in Washington, D.C.

liETtVLaARqgmMEbYzHNNLIzUPcdfPrwhYtVK7Qa.png Responsibilities: Key responsibilities include leading a team, architecting detection strategies, driving threat hunting operations, ensuring quality deliverables, and collaborating with SOC leadership to reduce risk.

liETtVLaARqgmMEbYzHNNLIzUPcdfPrwhYtVK7Qa.png Skills: Required skills include expertise in Cyber Threat Intelligence, Threat Hunting, Detection Engineering, experience with SIEM platforms, familiarity with EDR telemetry, and strong technical documentation abilities.

liETtVLaARqgmMEbYzHNNLIzUPcdfPrwhYtVK7Qa.png Qualifications: Preferred qualifications include programming skills, experience in cyber operations, technical reporting, and familiarity with threat detection frameworks and methodologies.

liETtVLaARqgmMEbYzHNNLIzUPcdfPrwhYtVK7Qa.png Location: This position is based in Washington, D.C., and requires an active Top Secret Clearance.

liETtVLaARqgmMEbYzHNNLIzUPcdfPrwhYtVK7Qa.png Compensation: Not provided by employer. Typical compensation ranges for this position are between $130,000 - $180,000.



Cybervance%20Logo-Small.png

Sr. Security Engineer-Cyber Threat Mitigation Lead

Washington, D.C.| Full-time

Cybervance is an equal opportunity employer that designs, develops, and manages the successful execution of training programs for government and private sector organizations. Cybervance believes in creating innovative solutions to deliver measured results.

We are looking for a Senior Security Engineer- Cyber Threat Mitigation Lead with an active Top Secret Clearance to lead a cross-functional team (Cyber Threat Intelligence, Hunt, and Analytics) on a long-term contract in Washington, D.C. The position is full-time/permanent and will support a US Government civilian agency. The position is available immediately upon finding a qualified candidate with the appropriate background clearance.

Responsibilities

Responsibilities include, but are not limited to:

The successful candidate will be a deeply technical leader with hands-on engineering experience, a clear understanding of attacker behavior, and the ability to convert threat intelligence into actionable detections and countermeasures. This position also owns the quality and clarity of team deliverables, ensuring all intelligence products, detections, and reports effectively communicate their value and impact.

  • Lead and mentor a cross-functional team of CTI analysts, threat hunters, and detection engineers.
  • Architect detection strategies based on emerging threats, adversary behaviors, and customer risk posture.
  • Drive threat hunting operations to proactively identify undetected malicious activity.
  • Translate threat intelligence reports and TTP analysis into actionable detections, telemetry gaps, and defensive measures.
  • Oversee and ensure the accuracy, clarity, and timeliness of all team deliverables, including:
  • Detection documentation and enrichment logic
  • Threat reports and intelligence summaries
  • Hunt plans and post-hunt analysis
  • Metrics and dashboards demonstrating operational impact
  • Champion technical excellence and documentation standards across the team.
  • Collaborate closely with SOC leadership, incident responders, and engineers to ensure team outputs drive measurable risk reduction.
  • Evaluate detection effectiveness and coverage using data-driven assessments.
  • Knowledge of detection engineering methodologies, including behavioral signature creation, enrichment logic, and telemetry correlation.
  • Familiarity with endpoint detection and response (EDR) telemetry (e.g., SentinelOne, CrowdStrike, Defender for Endpoint) and how adversary activity presents in those platforms.
  • Expertise in SIEM platforms such as Splunk (e.g., SPL query development, data models, correlation searches, macros, lookups, CIM normalization).
  • Proficiency with data transformation and routing technologies such as CRIBL, including pipeline logic and field normalization strategies.

Qualifications

  • Bachelor’s degree or higher
  • 7+ years of experience in cybersecurity, with direct experience in at least two of the following:
  • Cyber Threat Intelligence (CTI)
  • Threat Hunting / Adversary Emulation
  • Detection Engineering / Security Analytics
  • 2+ years of leadership experience with technical teams, including project ownership and report review responsibilities.
  • Proven experience translating complex technical data into consumable products for leadership, engineers, and IR staff.
  • Familiarity with SOC workflows, telemetry pipelines, and threat modeling.
  • Background in writing formal technical reports with a focus on clarity, completeness, and audience relevance.
  • Understanding of log sources across domains, including:
  • Host-based logs (Windows Event Logs, Sysmon, EDR)
  • Network telemetry (firewall, proxy, VPN, DNS, NDR)
  • Cloud logs (Azure AD, AWS CloudTrail, O365 Management Activity)
  • Familiarity with threat hunting techniques, including:
  • Hypothesis-driven hunting
  • Behavioral pattern detection
  • Environmental baselining and anomaly detection
  • Knowledge of common persistence mechanisms, lateral movement techniques, and evasion tactics used by threat actors.
  • Understanding of malware execution models (e.g., LOLBins, scripting engines, scheduled tasks, registry auto starts).
  • Ability to map cyber threat intelligence to technical detections, SOC coverage gaps, or architectural weaknesses.

Preferred Qualifications

  • Ability to understand customer non-technical mission sets and drive technical cyber operations to generate value for stakeholders.
  • Programming or scripting experience (e.g., Python, PowerShell, Bash, or similar) to assist with automation, enrichment, or analytic tooling.
  • Deep technical expertise in areas such as EDR telemetry, log forensics, malware behavior, or threat modeling.
  • Ability to translate complex technical threat intelligence into tangible technical controls, detections, and mitigations that reduce risk to the organization.
  • Familiarity with data routing/normalization platforms (e.g., CRIBL).
  • Experience with purple teaming, emulation frameworks, or detection validation.
  • Security certifications such as GCTI, GCFA, GREM, OSCP, or Splunk Certified Architect.

Average salary estimate

$155000 / YEARLY (est.)
min
max
$130000K
$180000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

Similar Jobs

Senior Cyber Defense Analyst to perform advanced SIEM-based detection, incident response, and mentoring for Cybervance's on-site Washington, D.C. team, requiring an active Top-Secret/SCI clearance.

Senior-level incident responder with Top-Secret clearance needed to lead IR operations, guide remediation, and strengthen network security posture for the Bureau of the Census.

Corteva Hybrid Des Moines, Iowa, United States
Posted 14 hours ago

Lead and optimize application support for Corteva’s North America IT product portfolio, overseeing vendor-managed services, implementing ITSM best practices, and driving measurable improvements in availability and customer experience.

Experienced network administrator needed to manage and secure hospital network infrastructure, ensuring continuous, compliant connectivity for clinical and administrative operations.

Photo of the Rise User

Link Solutions is hiring a cleared VTC Support Specialist in Adelphi, MD to configure, maintain, and troubleshoot video conferencing systems supporting DoD operations.

Posted 6 hours ago

American College of Education is looking for a Dynamics 365 CRM Developer & Administrator to manage, customize, and integrate its CRM platform to support institutional processes and student success initiatives.

iSoftTek Solutions Inc Hybrid No location specified
Posted 11 hours ago

Seeking an experienced Oracle EBS Functional Analyst with strong Oracle Financials and SQL skills to lead functional design, configuration and support for a global finance application portfolio.

Photo of the Rise User
Saalex Hybrid No location specified
Posted 21 hours ago

Spalding, a Saalex Company is hiring an Oracle Database Administrator to support DoD-focused Oracle environments (on-prem and AWS) in a hybrid role based in Patuxent River, MD.

Photo of the Rise User

Kimley‑Horn seeks an onsite IT Analyst in Austin to deliver local and regional helpdesk support, manage hardware and enterprise application installs, and troubleshoot Windows and Active Directory environments.

Children's Mercy seeks an Informatics Solutions Engineer to design, implement, and support EHR and clinical application integrations, with a focus on lab instrument interfaces and clinical systems.

Photo of the Rise User

Experienced security engineer needed to architect and operate defenses across cloud and enterprise environments for a growth-minded industrial automation software company.

Photo of the Rise User
Futurex Hybrid No location specified
Posted 12 hours ago

Experienced IT Systems Administrator needed to manage Windows and Microsoft 365 infrastructure, support end users, and maintain security and operational excellence at the Bulverde, TX office.

Photo of the Rise User
Anduril Industries Hybrid Costa Mesa, California, United States
Posted 13 hours ago

Experienced Oracle Fusion Cloud ERP Functional Administrator needed to manage backend administration, integrations, FBDI/BICC/PVO reporting, FSM configuration, and performance tuning for Financials and SCM in a mission-driven defense tech company.

Photo of the Rise User

Lead the administration, security, and optimization of WGU's educational technology ecosystem to support scalable, compliant online learning.

Photo of the Rise User

Experienced systems administrators with DoD Top Secret/SCI clearance are needed to support deployed systems, perform sustainment travel to foreign partners, and provide Tier 2 operational support for mission systems.

MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
HQ LOCATION
No info
EMPLOYMENT TYPE
Full-time, onsite
DATE POSTED
August 27, 2025
Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!