Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Senior Cybersecurity Analyst (Threat Hunting and Pursuit) image - Rise Careers
Job details

Senior Cybersecurity Analyst (Threat Hunting and Pursuit)

At phia we hire talented and passionate people who are focused on collaborative, meaningful work, providing technical and operational subject matter expertise and support services to our partners and clients.


phia is hiring a Senior Cybersecurity Analyst (Threat Hunting and Pursuit) who can think like a cyber attacker and develop and implement creative methods to detect and thwart those behaviors. You’ll use your network defense experience and analytical skills to rapidly prototype and develop scripts to create haystacks and sift through the false positives to find patterns and indicators. Work with our team of cyber threat hunting experts to find the adversary in common blind spots and advise federal customers on ways to close gaps and harden their network. This job is performed on-site in Lakewood, CO (Denver area).


What You'll Do
  • Actively hunt threats on client networks
  • Investigate SIEM and other security application logs for suspicious and malicious behaviors
  • Identify potential attack vectors and threat actor TTPs to support active network defense
  • Investigate security incidents and provide detailed overview of the event from intrusion to mitigation
  • Create behavior-based detections to monitor for suspicious and malicious activity
  • Collaborate with Cyber Threat Intelligence analysts and SOC analysts to jointly harden client networks
  • Review, improve, and implement complex network detections
  • Train and mentor junior analysts on best practices and Blue Team TTPs


Education + Requirements
  • Bachelor’s Degree
  • 12+ years of cybersecurity/information assurance experience (defense or offense)
  • Minimum of five (5) years technical experience effectively providing network and/or system administration, operations, and/or security testing and evaluation
  • Familiarity with the US Intelligence Community and using intelligence to support cyber defense/mitigation work
  • Familiarity with cyber hunt methodologies
  • Experience working cyber issues to include offensive or defensive TTPs
  • Understanding of foreign capabilities in IT or OT environments
  • Experience providing forensic and data analysis support to cyber issues
  • Experience with logging and data analysis platforms such as Kibana or Splunk
  • Experience with data forensic tools, including Wireshark, Kali tools, encoders/decoders, etc.
  • Experience working with Linux and command-line interfaces
  • Knowledge of common malware functionality and operations
  • Experience writing technical reports and briefing leadership
  • Ability to provide on-site, full-time support in a client environment


Required Certification (one or more of the follwing):
  • Minimum IAM or IAT Level III (i.e. one or more of CISSP, CCSP, CASP+CE, CISM, CISA, CCNP Security, GSLC, GCED, GCIH)


Additional Preferred/Desired Certifications (or similar):
  • GIAC Certified Cyber Threat Intelligence (GCTI)
  • GIAC Security Operations Certified (GSOC)
  • GIAC Defending Advanced Threats (GDAT)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Enterprise Incident Response (GEIR)
  • GIAC Certified Intrusion Analyst (GCIA)
  • GIAC Certified Detection Analyst (GCDA)
  • GIAC Certified Network Forensic Analyst (GNFA)
  • GIAC Certified Forensic Analyst (GCFA)
  • GIAC Critical Infrastructure Protection (GCIP)
  • GIAC Response and Industrial Defense (GRID)


Security Clearance:
  • U.S. Citizenship
  • Active Top Secret required
  • An agency background check is required


Desired:
  • Experience in leading cyber exercises
  • Experience with reporting IT Security events and incidents in the time prescribed based on policies and procedures
  • Experience with effectively providing network or system administration, or computer operations
  • Experience with forensics tools, Encase, IDA PRO, or Wireshark
  • Experience with US critical infrastructure
  • Experience with analyzing ICS and SCADA traffic
  • Experience with cyber operations center environments
  • Experience with writing technical reports and briefing leadership
  • Knowledge of supporting the IC, national level system security initiatives, and secure Information, Local Area Network (LAN), and Wide Area Network (WAN) technologies
  • Knowledge of virtualization
  • Experience working in Purple Teams supporting Red and Blue Team exercises and testing


$150,000 - $180,000 a year

#LI-LC1


Who You Are

 A proactive problem solver that appreciates the challenges of working in a fast-paced, dynamic environment.

Intellectually curious with a genuine desire to learn and advance your career.

An effective communicator, both verbally and in writing.

Customer service-oriented and mission-focused.

Critical thinker with excellent problem-solving skills

 

If your experience and qualifications aren’t a match for this position, you will remain in our database for consideration for future opportunities that may be a better fit.


Who We Are

phia, LLC is a Northern Virginia-based, small business established in 2011 with a focus on Cyber Intelligence, Cyber Security/Defense, Intrusion Analysis & Incident Response, Cyber Architecture & Capability Analysis, Cyber Policy & Strategy, and Information Assurance/Security. we proudly support various agencies and offices within the Department of Defense (DoD), Federal government, and private/commercial entities.

phia values work-life balance and offers the following benefits to full-time employees:

 Comprehensive medical insurance to include dental and vision

Short Term & Long-Term Disability

 401k Retirement Savings Plan with Company Match

Tuition and Professional Development Assistance Flex Spending Accounts (FSA)


phia does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity, or any other reason prohibited by law in the provision of employment opportunities and benefits.


Average salary estimate

$165000 / YEARLY (est.)
min
max
$150000K
$180000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Senior Cybersecurity Analyst (Threat Hunting and Pursuit), phia, LLC

At phia, we're excited to share that we're looking for a Senior Cybersecurity Analyst specializing in Threat Hunting and Pursuit to join our passionate team in Lakewood, CO. If you're someone who thrives on intellectual challenges and wants to push the boundaries of cybersecurity, you could be the perfect fit! In this role, you'll need to think like a cyber attacker to stay one step ahead of potential threats. Your day-to-day tasks will include actively hunting for threats within client networks and investigating security logs for any suspicious activity. Here, the aim is to detect and thwart cyber-attacks through innovative methods. You'll leverage your extensive knowledge of network defenses to quickly develop scripts that help identify patterns amidst the chaos. Collaboration is key, so you'll work side by side with our talented cyber threat hunting experts and enjoy mentoring junior analysts, fostering a culture of knowledge sharing. We're deeply committed to helping our federal customers enhance their cybersecurity measures, and your insights will be pivotal in strengthening their defenses. With a passion for problem-solving and a keen analytical mindset, you'll not only identify potential vulnerabilities — you'll help craft strategies to close those gaps effectively. If you're ready to make a real impact in the world of cybersecurity, phia is the place for you!

Frequently Asked Questions (FAQs) for Senior Cybersecurity Analyst (Threat Hunting and Pursuit) Role at phia, LLC
What qualifications do I need to apply for the Senior Cybersecurity Analyst position at phia?

To apply for the Senior Cybersecurity Analyst (Threat Hunting and Pursuit) position at phia, you will need a Bachelor's Degree along with at least 12 years of experience in cybersecurity or information assurance. Additionally, having at least 5 years of technical experience in network and system administration, operations, or security testing is crucial. Certifications like CISSP, CISM, or GIAC certifications are also highly preferred.

Join Rise to see the full answer
What does a Senior Cybersecurity Analyst at phia do on a daily basis?

As a Senior Cybersecurity Analyst (Threat Hunting and Pursuit) at phia, you would engage in activities such as actively hunting for threats in client networks, investigating security logs, identifying potential attack vectors, and collaboratively implementing network defenses. Your work involves a mix of technical analysis and proactive threat detection strategies to ensure robust client network security.

Join Rise to see the full answer
Is on-site presence required for the Senior Cybersecurity Analyst role at phia?

Yes, the role of Senior Cybersecurity Analyst (Threat Hunting and Pursuit) at phia is performed on-site in Lakewood, CO. This allows for real-time collaboration with the cybersecurity team and fosters a dynamic work environment supportive of hands-on cybersecurity operations.

Join Rise to see the full answer
What skills are essential for succeeding in the Senior Cybersecurity Analyst position at phia?

Key skills for the Senior Cybersecurity Analyst role at phia include strong analytical skills, experience with SIEM tools, familiarity with cyber threat methodologies, and technical proficiency in areas like forensic analysis and network security. Being a proactive problem solver and an effective communicator is also crucial in this role.

Join Rise to see the full answer
What is the salary range for the Senior Cybersecurity Analyst position at phia?

The salary range for the Senior Cybersecurity Analyst (Threat Hunting and Pursuit) position at phia is between $150,000 and $180,000 per year. This competitive compensation reflects the level of expertise and experience needed for this critical role in cybersecurity.

Join Rise to see the full answer
What benefits does phia offer to full-time employees?

phia offers a comprehensive benefits package to full-time employees which includes medical, dental, and vision insurance, short and long-term disability coverage, a 401k retirement savings plan with company match, and tuition assistance for professional development. We truly value the well-being and career advancement of our team members.

Join Rise to see the full answer
How does phia support diversity and inclusion in the workplace?

At phia, we are committed to creating an inclusive and diverse workplace. We do not discriminate based on race, sex, color, religion, age, national origin, marital status, disability, or any other protected status in our employment opportunities and benefits, promoting an environment where every employee is valued and respected.

Join Rise to see the full answer
Common Interview Questions for Senior Cybersecurity Analyst (Threat Hunting and Pursuit)
Can you explain your experience with threat hunting methodologies in your previous roles?

In answering this question, focus on specific methodologies you've used in the past and elaborate on how these have enhanced your effectiveness in threat detection. Discuss any tools or frameworks you're familiar with and provide examples of successful threat hunts you've conducted.

Join Rise to see the full answer
What approach do you take to investigate security incidents?

Here, you should detail your systematic approach to investigations, including initial assessment, data gathering, analysis, and incident response. Highlight any specific tools or processes that you've found effective in providing thorough incident breakdowns.

Join Rise to see the full answer
How do you prioritize threats when faced with multiple alerts?

Illustrate your ability to triage alerts based on severity, potential impact, and context. Discuss how you use data analysis to make informed decisions about which threats deserve immediate attention and how that affects your overall threat-hunting strategy.

Join Rise to see the full answer
What experience do you have with cybersecurity tools like Splunk or Kibana?

Share specific experiences you've had using these tools to log, analyze, or visualize data. Be sure to mention any particular instances where your use of these tools led to the identification of threats or helped streamline monitoring processes.

Join Rise to see the full answer
How would you train a junior analyst in threat hunting techniques?

Focus on your mentorship philosophy and techniques. Discuss how you would tailor training to the analyst's level of experience, including hands-on activities and mentoring sessions. Emphasize the importance of continuous learning in cybersecurity.

Join Rise to see the full answer
Can you describe an impactful lesson learned from a past cyber incident?

Use this opportunity to convey a key lesson learned, emphasizing not just the incident itself, but how it affected your approach to cybersecurity. Detail steps you now take to prevent similar issues and how this shapes your threat-hunting perspective.

Join Rise to see the full answer
What factors do you believe are vital for effective network security?

Reflect on key aspects like employee training, incident response policies, and technology solutions. Support your answer with examples from your experience, highlighting how these factors contribute to a robust security posture.

Join Rise to see the full answer
How do you stay updated with the latest cybersecurity trends and threats?

Share your methods for keeping current, whether through professional development, certifications, industry news, or networking. Mention any resources or communities you actively engage with and how this knowledge informs your work.

Join Rise to see the full answer
Can you provide examples of how you have collaborated with other analysts in a cybersecurity team?

Describe specific projects or incidents where teamwork was essential. Highlight communication methods, the importance of collaboration in incident response, and any tools or practices you implemented to make teamwork effective.

Join Rise to see the full answer
What strategies do you use to communicate technical concepts to non-technical stakeholders?

Discuss your strategies for simplifying complex concepts without losing essential details. Share examples of how you've successfully communicated incidents or security measures to non-technical personnel, emphasizing the importance of understanding by laypersons.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
phia, LLC Remote Washington, DC
Posted 11 days ago
Photo of the Rise User
Capgemini Remote No location specified
Posted 11 days ago
Giga IT Remote No location specified
Posted 5 days ago
Booksy Remote No location specified
Posted 3 days ago
Photo of the Rise User
Posted yesterday
Photo of the Rise User
Posted 8 days ago
xAI Hybrid London, UK & San Francisco & Palo Alto, CA
Posted 12 days ago

future of fashion coming soon

9 jobs
MATCH
VIEW MATCH
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
November 24, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!