Join to apply for the Junior Cybersecurity Threat Hunter role at hackajob
Join to apply for the Junior Cybersecurity Threat Hunter role at hackajob
Get AI-powered advice on this job and more exclusive features.
hackajob is collaborating with ManTech to connect them with exceptional tech professionals for this role.
ManTech seeks a motivated, career and customer-oriented Junior Cybersecurity Threat Hunter to join our team in the DC, Maryland, and Virginia (DMV) area.
The ideal candidate will be adept at identifying, analyzing, and mitigating advanced cyber threats. In this role you will respond to crisis or urgent situations to mitigate immediate and potential threats. Approaches may include the use information and threat intelligence specifically focused on a proximate incident to identify undiscovered attacks. You will investigate and analyzesall relevant response activities. This role is crucial in enhancing the cybersecurity posture of DHS by proactively seeking out and neutralizing cyber threats before they can impact our systems. The Cyber Security Threat Hunter may respond to crisis or urgent situations to mitigate immediate and potential threats. Approaches may include the use information and threat intelligence specifically focused on a proximate incident to identify undiscovered attacks. The Cyber Security Threat Hunter will collaborate with other internal and external POCs and teams improving the security posture of the DHS enterprise.
Responsibilities Include, But Are Not Limited To
- Collaborate with incident response teams to investigate, analyze, and remediate identified threats
- Identify and assess the capabilities and activities of cyber criminals or foreign intelligence entities; design and administer procedures in the organization that sustains the security of the organization’s data and access to its technology and communications systems
- Identifies and assesses the capabilities and activities of cyber criminals or foreign intelligence entities; design and administer procedures in the organization that sustains the security of the organization’s data and access to its technology and communications systems.
- Provide computer forensic support to high technology investigations in the form of evidence seizure, computer forensic analysis, and data recovery
- Monitor and assess complex security devices for patterns and anomalies from raw events (DNS, DHCP, AD, SE logs), tag events for Tier 1 & 2 monitoring
- Conduct malware analysis in out-of-band environment (static and dynamic), including complex malware; proactively search for and identify cyber threats, including advanced persistent threats (APTs), that could compromise DHS networks and systems; prepare detailed threat reports and briefings for technical and non-technical stakeholders.
- Analyze network traffic, system logs, and other data sources to detect anomalies and indicators of compromise (IOCs); develop and implement threat hunting methodologies, techniques, and tools to improve detection capabilities
Minimum Qualifications
- Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- 1+ years of relevant experience
- 8570 compliant certifications; relevant certifications such as CISSP, GCIH, GCFA, GCIA, or similar are highly desirable.
Preferred Qualifications
- Previous Network Operations Center (NOC) or IT Operations experience and a strong understanding of network protocols, system logs, and security event correlation.
- Familiarity with DHS policies and procedures. Knowledge of broader cybersecurity frameworks (e.g., NIST, ISO 27001).
- Understanding of ITIL4 principles
- Master’s Degree
- Proficiency with threat hunting tools and platforms (e.g., Splunk, ELK Stack, CrowdStrike, Carbon Black) and experience in analyzing malware, attack vectors, and threat actor TTPs.
Clearance Requirements
- Must have a current/active Secret clearance with the ability to obtain and maintain a TS/SCI.
- The ability to obtain and maintain a DHS EOD suitability is required prior to starting this position.
Physical Requirements
- Must be able to remain in a stationary position 50%
- Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer
- The person in this position needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Seniority level
Seniority level
Entry level
Employment type
Job function
Job function
Information TechnologyIndustries
Software Development
Referrals increase your chances of interviewing at hackajob by 2x
Sign in to set job alerts for “Cyber Threat Investigator” roles.
Junior Security Control Assessor with Top Secret
Washington, DC $120,000.00-$155,000.00 2 weeks ago
Senior Manager, AWS Corp Security Response
Herndon, VA $187,500.00-$324,100.00 1 week ago
Security Analyst (Adjudicator-Multiple Levels)
Security Control Assessor (SCA) (TS/SCI)
Senior Security Incident Response Engineer, AWS, AWS CorpSec Response
Herndon, VA $143,300.00-$247,600.00 2 weeks ago
Washington, DC $137,000.00-$246,600.00 4 days ago
Enterprise Senior Security Manager (Active TS/SCI with Poly Required)
Sr. Security Engineer, Healthcare Security
Arlington, VA $143,300.00-$247,600.00 6 days ago
DHS Sr. Operational Technology (OT) Security Engineer
Washington, DC $195,000.00-$225,000.00 6 months ago
Fall 2025, Research Internship, Center on Economic Security and Opportunity, Economic Studies ( Job ID 2025-3655)
Senior Security Analyst (Top Secret Clearance)
Offensive Security Engineer - Senior Technical Lead (In Office or Remote)
McLean, VA $172,000.00-$258,000.00 2 weeks ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.