-
hackajob

Junior Cybersecurity Threat Hunter

hackajob
United States · Full-time · Entry

hackajob is collaborating with ManTech to connect them with exceptional tech professionals for this role.

ManTech seeks a motivated, career and customer-oriented Junior Cybersecurity Threat Hunter to join our team in the DC, Maryland, and Virginia (DMV) area.

The ideal candidate will be adept at identifying, analyzing, and mitigating advanced cyber threats. In this role you will respond to crisis or urgent situations to mitigate immediate and potential threats. Approaches may include the use information and threat intelligence specifically focused on a proximate incident to identify undiscovered attacks. You will investigate and analyzesall relevant response activities. This role is crucial in enhancing the cybersecurity posture of DHS by proactively seeking out and neutralizing cyber threats before they can impact our systems. The Cyber Security Threat Hunter may respond to crisis or urgent situations to mitigate immediate and potential threats. Approaches may include the use information and threat intelligence specifically focused on a proximate incident to identify undiscovered attacks. The Cyber Security Threat Hunter will collaborate with other internal and external POCs and teams improving the security posture of the DHS enterprise.

Responsibilities Include, But Are Not Limited To

  • Collaborate with incident response teams to investigate, analyze, and remediate identified threats
  • Identify and assess the capabilities and activities of cyber criminals or foreign intelligence entities; design and administer procedures in the organization that sustains the security of the organization’s data and access to its technology and communications systems
  • Identifies and assesses the capabilities and activities of cyber criminals or foreign intelligence entities; design and administer procedures in the organization that sustains the security of the organization’s data and access to its technology and communications systems.
  • Provide computer forensic support to high technology investigations in the form of evidence seizure, computer forensic analysis, and data recovery
  • Monitor and assess complex security devices for patterns and anomalies from raw events (DNS, DHCP, AD, SE logs), tag events for Tier 1 & 2 monitoring
  • Conduct malware analysis in out-of-band environment (static and dynamic), including complex malware; proactively search for and identify cyber threats, including advanced persistent threats (APTs), that could compromise DHS networks and systems; prepare detailed threat reports and briefings for technical and non-technical stakeholders.
  • Analyze network traffic, system logs, and other data sources to detect anomalies and indicators of compromise (IOCs); develop and implement threat hunting methodologies, techniques, and tools to improve detection capabilities

Minimum Qualifications

  • Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • 1+ years of relevant experience
  • 8570 compliant certifications; relevant certifications such as CISSP, GCIH, GCFA, GCIA, or similar are highly desirable.

Preferred Qualifications

  • Previous Network Operations Center (NOC) or IT Operations experience and a strong understanding of network protocols, system logs, and security event correlation.
  • Familiarity with DHS policies and procedures. Knowledge of broader cybersecurity frameworks (e.g., NIST, ISO 27001).
  • Understanding of ITIL4 principles
  • Master’s Degree
  • Proficiency with threat hunting tools and platforms (e.g., Splunk, ELK Stack, CrowdStrike, Carbon Black) and experience in analyzing malware, attack vectors, and threat actor TTPs.

Clearance Requirements

  • Must have a current/active Secret clearance with the ability to obtain and maintain a TS/SCI.
  • The ability to obtain and maintain a DHS EOD suitability is required prior to starting this position.

Physical Requirements

  • Must be able to remain in a stationary position 50%
  • Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer
  • The person in this position needs to occasionally move about inside the office to access file cabinets, office machinery, etc.

Key Skills

Ranked by relevance

cybersecurity cyber security incident response malware analysis splunk cissp nist dhcp elk dns
Login to Apply
Posted
Jun 28, 2025
Type
Full-time
Level
Entry
Location
Herndon
Company
hackajob

Industries

Software Development

Categories

Information Technology

Related Jobs

3 roles aligned with this opportunity

View all jobs
View Job Details
Bizon
Related

IT - Project Manager (on-site)

2026-04-13

Full-time
Mid-Senior
Latvia
Software Development
Project Management
View Job Details
hackajob
Related

AI Engineer

2026-04-11

Full-time
Not Applicable
United Kingdom
Software Development
Engineering
View Job Details
Front
Related

Product Designer

2026-04-10

Full-time
Not Applicable
United States
Software Development
Design