Overview
Skills
Job Details
Valiant Solutions is seeking an Threat Hunting and Research Architect to join our rapidly growing and innovative cybersecurity team!
We are seeking a highly skilled and strategic Threat Hunting and Research Architect to support our client s enterprise cybersecurity program. This is a senior position that will serve as the lead architect and team lead, delivering both technology and analytics solutions to support hunting and intelligence. This role will provide advanced threat detection, hunting, and analysis support across a diverse set of environments, including secure data networks, on-premises zero-trust networks, and cloud architectures. The ideal candidate will bring a deep understanding of threat intelligence and threat hunting. The successful candidate will have experience designing tooling and automation solutions to support the analytics needs of threat-hunting and threat intelligence teams. You must have extensive experience researching adversary tactics, strong collaboration skills, and a proactive mindset to mitigate evolving cyber threats. The role includes supporting security operations center (SOC) functions, facilitating threat hunting and intelligence-sharing, developing custom analytics, and aligning strategic cybersecurity efforts with client directives. You will lead the design, development, and operation of technology solutions to support threat hunting and threat intelligence.
Named one of the in the Washington DC area for 11 consecutive years, Valiant is proud of our employee-centric culture and commitment to excellence. If you are interested in learning more about Valiant and this opportunity, we invite you to apply now!
This position allows for 100% remote work. Remote work necessitates a high-level trust in our employees and we strictly adhere to the details found below in our Remote Work Policy.
Required Experience:
- Active Top Secret Clearance
- Bachelor's degree in Cybersecurity, Information Technology, or a related field is preferred
- 10 years of experience leading 24x7x365 SOCs, including at least five (5) years managing hybrid environments that span both on-premises and cloud infrastructures.
- 5+ years of experience in cybersecurity with a focus on threat research, threat hunting, or cyber defense analysis.
- 5+ years of experience working with Splunk
- 5+ years experience scripting in Python
- Experience working with Threat Intelligence Platforms such as MISP
- Experience designing tooling solutions to support threat intelligence and hunt programs
- Demonstrated expertise with advanced threat detection techniques and TTP (tactics, techniques, and procedures) analysis.
- Experience supporting large enterprise SOC environments (on-premises and cloud-based).
- Familiarity with Zero Trust security architectures.
- Proficient in developing and using custom data analytics for threat detection.
- Strong working knowledge of cybersecurity tools and platforms (e.g., SIEM, threat intelligence platforms, endpoint detection).
- Experience using ticketing and incident management systems (e.g., ServiceNow).
- Strong communication and reporting skills with the ability to brief senior executives, CIOs, and technical teams.
- Experience leading or supporting cross-functional cyber teams.
- Related certifications (e.g., CISSP, GCIA, GCTI) preferred.
Responsibilities:
- Perform advanced threat research and cyber threat hunting across client enterprise and bureau environments.
- Identify and mitigate sophisticated threats using custom analytics, threat models, and prioritization frameworks.
- Collaborate with SOC teams and bureau security units to share threat intelligence and coordinate detection strategies.
- Support cybersecurity operations through ticket management, artifact analysis, and documentation within the client s ServiceNow system.
- Generate standard and ad hoc threat reports and executive briefings as requested by the client.
- Develop and refine cyber event triage methodologies to support efficient incident response.
- Assist in the consolidation and enhancement of SOC services across multiple client entities.
- Serve as a primary technical resource to the Enterprise Cybersecurity Delivery, Intake, and Operations Management team.
- Support the contract lead with escalations, reporting, and ensuring strategic alignment with client cybersecurity goals.
- Develop and maintain threat detection content, including signatures, use cases, and behavioral analytics to improve proactive defense capabilities.
- Evaluate and integrate threat intelligence feeds and enrichment sources to enhance situational awareness and context for threat investigations.
- Provide expert-level guidance on emerging technologies, attack vectors, and evolving threat landscapes to inform strategic cybersecurity planning.
- Participate in red team/blue team exercises to validate detection capabilities and identify defensive gaps across client systems.
- Mentor junior analysts and engineers, fostering knowledge-sharing and professional development within the cyber operations team.