Cyber Threat Hunt & Forensics Analyst Job at Stondoh Secure Digital Solutions, Washington DC

c0Z2MFp3a1pWV0VaRGVEWi9YU1JzSjBWTGc9PQ==
  • Stondoh Secure Digital Solutions
  • Washington DC

Job Description

Stondoh Secure Digital Solutions is seeking a Cyber Threat Hunt & Forensics Analyst to:

  • Ingest and analyze multi-source threat intelligence, including adversary research and MITRE ATT&CK–mapped Tactics, Techniques, and Procedures (TTPs) , to understand relevant and emerging threats.

  • Develop and refine threat hypotheses based on intelligence, environmental context, and observed behavioral patterns.

  • Conduct proactive cyber threat hunting across enterprise networks, endpoints, cloud environments, and log datasets to identify malicious, suspicious, or anomalous activity that evades existing security controls.

  • Apply deep technical knowledge of network protocols, services, and operating system internals to analyze telemetry, validate hypotheses, and differentiate benign from malicious behavior.

  • Analyze adversary tradecraft across email, application, cloud, and operating system environments to improve behavioral understanding and detection strategy.

  • Identify detection gaps and recommend improvements to hunting techniques, analytics, and security monitoring based on hunt outcomes.

  • Perform forensics and malware analysis , as needed, to validate threat hunting findings and extract supporting Indicators of Compromise (IOCs), including support for forensic evidence preservation when required.

Salary Range: $107,000 – $135,000

Retirement Benefits: 401(k) with 3% Safe Harbor + 3% Employer Match

Clearance Required: Active Secret

(Non-SCIF role; occasional secure facility access as needed)

Required Skills

  • Strong written and verbal communication skills to clearly document findings and communicate technical conclusions.

  • Ability to apply threat intelligence , including MITRE ATT&CK, to understand adversary behavior and inform hypothesis-driven hunting.

  • Proficiency in proactive cyber threat hunting across enterprise networks, endpoints, cloud environments, and log datasets.

  • Ability to develop and refine detections and analytics based on observed adversary behavior and hunt outcomes.

  • Strong understanding of attacker tradecraft across email, application, and cloud-based threat vectors.

  • Advanced knowledge of networking fundamentals (TCP/IP, DNS, SMTP, DHCP) to analyze telemetry and network activity.

  • Advanced knowledge of operating system internals and security mitigations across major platforms (Windows, Linux, macOS, mobile).

Desired Skills

  • Experience performing digital forensics on network, host, or memory artifacts to validate threat hunting findings.

  • Experience analyzing malware or anomalous code to determine malicious intent and functionality.

  • Experience using forensic tools such as EnCase, Sleuthkit, or FTK.

  • Experience preserving and handling digital evidence , including maintenance of chain of custody.

  • Scripting or automation experience (e.g., Python, PowerShell, Bash ) to support hunting workflows.

  • Experience using SIEM platforms and query languages (e.g., Splunk, Sentinel).

  • Experience producing threat intelligence products , including written reports or briefings.

Desired Certifications / Experience

  • Bachelor's degree or higher.

  • 7+ years of experience performing cyber threat hunting and supporting forensic analysis in support of enterprise or government incident response.

Position Responsibilities

  • Analyze threat intelligence and adversary frameworks (including MITRE ATT&CK and the Azure Threat Research Matrix ) to identify relevant tactics, techniques, gaps, and detection shortfalls.

  • Plan and execute intelligence-driven and hypothesis-based cyber threat hunts across enterprise environments.

  • Research and correlate large datasets and telemetry to uncover novel attack techniques, track adversary tradecraft, and investigate security alerts.

  • Design, develop, and enhance cloud-native threat detections and analytics , including support for automated detection capabilities.

  • Apply structured methodologies (e.g., Agile) to organize threat hunting activities, intelligence analysis, and reporting of outcomes.

  • Analyze logs and supporting artifacts to validate threat hunting findings and determine adversary activity and scope.

  • Perform digital forensics and evidence handling , as required, including creation of forensically sound copies and preservation of chain of custody, and produce clear technical reporting.

This is a full-time position supporting a U.S. Government civilian agency and is available immediately for a qualified candidate with the appropriate technical expertise and an active Secret clearance.

Job Tags

Full time, Immediate start,

Similar Jobs

The Smilist

Periodontist Job at The Smilist

 ...and establishing treatment programs to monitor oral health. Periodontist Responsibilities: Providing implants Performing cosmetic surgical procedures Diagnosing and treating conditions Developing treatment plans Providing preventative treatment Resolving... 

Bobcat of Canton- Leppo Rents

Diesel Mechanic (Truck & Trailer) Job at Bobcat of Canton- Leppo Rents

Are you the type who loves getting under the hood, solving problems, and keeping trucks rolling strong? At Leppo Rents, were not just fixing truckswere building careers. Were looking for a Diesel Truck & Trailer Technician whos ready to take on a fast-paced, hands-...

jobgether

Technical Project Manager - REMOTE Job at jobgether

 ...This position is posted by Jobgether on behalf of a partner company. We are currently looking for a Technical Project Manager - REMOTE. In this role, you will manage complex and large-scale technology initiatives that span across teams and functions. You will work closely... 

St Bonaventure Church

Virtual Assistant (remote) Job at St Bonaventure Church

Virtual Assistant Job Responsibilities Respond to emails and phone calls Manage the CEOs calendar (including scheduling meetings) Book travel and accommodations Create presentations and write official, company-wide correspondence Virtual Assistant Qualifications...

Pfizer

Senior Director, HTA, Value and Evidence, Oncology, Pipeline Job at Pfizer

 ...Oncology Division.**ROLE RESPONSIBILITIES**+ Lead the development of access evidence generation strategy to support the value of Pfizer's Oncology pipeline assets, in close partnership with the cross-functional matrix team.+ Lead the coordination of input from local...