We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Cyber Security Engineer / Threat Hunter

Quadrant, Inc.
United States, Virginia, McLean
Apr 03, 2026
Cyber Security Engineer / Threat Hunter

McLean, VA / Hybrid

Pay from : $135,000/yr

MUST:


Experienced Security Engineer / Threat Hunter

6+ years of professional experience in cyber security and information assurance

2+ years of hands-on experience working in Threat Hunter capacity

Strong hands-on experience with vulnerability management and remediation

Strong hands on experience with security tools Tenable, Splunk and BigFix

Strong understanding of ITAM to help bridge the gap between security vulnerability detection and IT operations remediation

Knowledge and understanding of integrating the security lifecycle into the system development lifecycle (SDLC)

Experience with policy creation, best business practices, and general Cybersecurity governance

Candidate will have experience in designing and implementing security requirements into products and systems

Experience in RMF Assess and Authorize (A&A) and Cybersecurity inspection actions

Experience serving as Information System Security Manager, Representative (ISSM-R)

Familiar with Government Standards such as DISA STIGs, NIST 800

Must have strong verbal and written communication skills

Able to communicate well with senior Development team and client

Relevant certifications are a plus

Bachelor's Degree in related field strongly desired

DUTIES :

The ideal candidate will provide data analysis to determine if there was risk of incident

This candidate will proactively search for security incidents patterns, trends that would not normally be detected through automated alerting

The Threat Hunt mission is to explore datasets across the judicial fabric to identify unique anomalies that may be indicative of threat actor activity based on the assumption that the adversary is already present in the judicial fabric

Using Tenable Splunk and ITAM this candidate will collect and analyze data from systems to identify potential or current compromised systems and report back to the team

The extended mission is to conduct counterintelligence, build threat actor dossiers, disrupt adversary operations, identify misconfigurations/ vulnerabilities, and identify visibility/detection gaps, if any

Participate in team led after action reviews of incidents to find data correlations

Use data from technical requests through the ticketing system for threat hunt support

Threat hunt targets include cloud-based and non-cloud-based applications such as: Microsoft Azure, Microsoft O365, Microsoft Active Directory, and Cloud Access Security Brokers (i.e., Zscaler)

Review open-source intelligence about threat actors when developing hunt hypotheses

Plan, conduct, and document iterative, hypothesis based, tactics, techniques, and procedures (TTP) hunts utilizing the agile scrum project management methodology

At the conclusion of each hunt, propose, discuss, and document custom searches for automated detection of threat actor activity based on the hunt hypothesis

Track and document cyber defense incidents from initial detection through final resolution

Triage malware events to identify the root cause of specific activity

Attend daily Agile Scrum standups and report progress on assigned Jira stories


Quadrant is an affirmative action/equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, status as a protected veteran, or status as an individual with a disability. "Healthcare benefits are offered to all eligible employees according to compliance mandated by the Affordable Care Act".

Applied = 0

(web-bd9584865-rg2f4)