We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Threat Hunting Analyst

Evolver, LLC
vision insurance, flexible benefit account, parental leave, 401(k)
United States, Mississippi, Kiln
9313 Cypress Loop Road (Show on map)
Aug 12, 2025

A Threat Hunting Analyst is responsible for proactively searching for, identifying, and responding to security threats that have bypassed existing security measures. This role involves using specialized tools and a deep understanding of cyber threat tactics to protect the organization's network and data. The analyst will analyze large datasets, develop new detection methodologies, and work to maintain a strong security posture.

This role requires onsite work in Stennis Space Center Kiln, MS

Responsibilities:



  • Proactively hunt for cyber threats and anomalies across the network, endpoints, and cloud environments.
  • Analyze security event data, network traffic, and host artifacts to identify indicators of compromise (IOCs).
  • Develop and implement custom detection queries and rules for security information and event management (SIEM) platforms, such as Splunk.
  • Conduct in-depth forensic analysis and incident response activities to determine the scope and impact of security incidents.
  • Stay up-to-date with the latest threat intelligence, attack methodologies, and vulnerabilities to inform hunting strategies.
  • Prepare detailed reports on threat findings, incident analysis, and recommended remediation actions for both technical and non-technical audiences.
  • Collaborate with other security teams, including incident response, security engineering, and security operations, to improve overall security defenses.



Basic Qualifications:



  • Bachelor's Degree or 3 yrs in forensic analysis and incident response.
  • 2 years Proficiency in using security tools such as Splunk, Wireshark, and other comparable security analysis platforms.
  • 2 years of experience with cyber security principles, including network protocols, operating systems, and common attack vectors.
  • 2 years of experience in forensic analysis and incident response.
  • Have and maintain at least 2 (Two) Active Certifications: Security+, GCIH, ISC2 CISSP, GSE, GREM, GAWN, GCIA, GPPA, GSEC, GCED, GSLC, GSNA, GCFA, Or other comparable certifications.
  • Active Top Secret with SCI eligibility



Preferred Qualifications




  • 3 years Proficiency in using security tools such as Splunk, Wireshark, and other comparable security analysis platforms.
  • 3 years of experience with cyber security principles, including network protocols, operating systems, and common attack vectors.
  • 3 years of experience in forensic analysis and incident response.
  • Ability to analyze and interpret large datasets to identify subtle patterns of malicious activity.
  • Excellent problem-solving skills and the ability to think like an adversary.
  • Strong communication and report-writing skills.
  • Ability to work independently and as part of a team in a fast-paced environment.



Evolver Federal is an equal opportunity employer and welcomes all job seekers. It is the policy of Evolver Federal not to discriminate based on race, color, ancestry, religion, gender, age, national origin, gender identity or expression, sexual orientation, genetic factors, pregnancy, physical or mental disability, military/veteran status, or any other factor protected by law.

Actual salary will depend on factors such as skills, qualifications, experience, market and work location. Evolver Federal offers competitive benefits, including health, dental and vision insurance, 401(k), flexible spending account, and paid leave (including PTO and parental leave) in accordance with our applicable plans and policies.

Applied = 0

(web-5cf844c5d-bzcc6)