SOC Threat Hunter

Portland, OR, US • Posted 5 hours ago • Updated 5 hours ago
Full Time
On-site
Fitment

Dice Job Match Score™

📋 Comparing job requirements...

Job Details

Skills

  • Network
  • Use Cases
  • Dashboard
  • Research
  • Workflow
  • Tier 2
  • Tier 3
  • Reporting
  • Leadership
  • Continuous Improvement
  • Knowledge Management
  • SIEM
  • Network Security
  • Analytics
  • Security Controls
  • Analytical Skill
  • Communication
  • Splunk
  • Packet Analysis
  • Cloud Security
  • Scripting
  • Data Analysis
  • System On A Chip
  • Incident Management
  • Malware Analysis
  • Forensics
  • Threat Analysis
  • Microsoft Windows
  • Linux
  • Computer Networking
  • Authentication
  • Cloud Computing
  • GCIH
  • GCIA
  • GCFA
  • CISSP
  • Security+
  • SAP BASIS
  • Law
  • Artificial Intelligence
  • Cyber Security
  • Partnership
  • Innovation
  • Accountability

Summary

Job Description

Everforth ECS is seeking a SOC Threat Hunter to work in our Portland, OR office. Please Note: This position is contingent upon contract award.

The Threat Hunter proactively identifies , investigates, and helps mitigate advanced cyber threats that may evade automated detection and traditional monitoring. This role develops threat hypotheses, analyzes endpoint, network, cloud, identity, and security event data, and conducts structured hunts to uncover suspicious behaviors, attacker techniques, and control gaps.

The ideal candidate has strong analytical skills, hands-on experience with security monitoring and investigation tools, and the ability to translate threat research into repeatable hunt procedures, detection improvements, and actionable findings for SOC, incident response, engineering, and threat intelligence stakeholders.

Key Responsibilities

Threat Hunting & Analysis
  • Develop and execute hypothesis-driven hunts across enterprise, cloud, endpoint, identity, and network data sources
  • Analyze anomalous behavior, suspicious activity, and attacker tactics, techniques, and procedures (TTPs)
  • Use SIEM, EDR, network, log analytics, and threat intelligence tools to identify potential compromise or unauthorized activity
  • Validate hunt findings, assess potential impact, and determine whether escalation to incident response or SOC operations is required
Detection Development & Improvement
  • Translate hunt findings into detection logic, analytic requirements, alert tuning recommendations, and monitoring use cases
  • Identify gaps in logging, visibility, correlation logic, and alert coverage
  • Partner with SOC analysts, Splunk engineers, security engineers, and threat intelligence analysts to improve detection fidelity and coverage
  • Support development of repeatable hunt playbooks, queries, dashboards, and analytic procedures
Threat Research & Intelligence Application
  • Research emerging threats, adversary behaviors, malware trends, vulnerabilities, and exploitation techniques relevant to the environment
  • Map threat activity and hunt hypotheses to recognized frameworks such as MITRE ATT&CK
  • Incorporate threat intelligence into hunt planning, detection enhancement, and investigative workflows
  • Provide feedback to threat intelligence teams on observed activity, intelligence gaps, and collection priorities
Investigation Support & Escalation
  • Support advanced investigations by correlating security events, system activity, user behavior, and contextual data
  • Document investigative steps, evidence, conclusions, and recommended follow-up actions
  • Coordinate with SOC Tier 2 and Tier 3 analysts, forensics personnel, and incident response teams during escalations
  • Assist with post-incident hunt activity to identify related indicators, lateral movement, persistence, or additional affected assets
Reporting & Continuous Improvement
  • Produce clear hunt reports, summaries, findings, and recommendations for technical and leadership audiences
  • Track hunt outcomes, recurring patterns, detection gaps, and operational metrics
  • Contribute to continuous improvement of SOC processes, analytic standards, and knowledge management resources
  • Stay current with adversary tradecraft, detection engineering practices, and security analytics techniques


Required Skills

  • 5+ years of experience in cybersecurity operations, threat hunting, incident response, detection engineering, security monitoring, or related roles
  • Hands-on experience using SIEM, EDR, network security, endpoint telemetry, cloud logging, and/or log analytics platforms
  • Strong understanding of adversary tactics, techniques, and procedures; common attack paths; and enterprise security controls
  • Experience developing or using hunt hypotheses, detection logic, investigative queries, and analytic playbooks
  • Ability to analyze large volumes of security data and distinguish suspicious activity from benign behavior
  • Strong written communication skills, including the ability to document findings, evidence, and recommendations clearly


Desired Skills

  • Experience with Splunk, EDR platforms, packet analysis, cloud security telemetry, identity logs, or scripting for data analysis
  • Familiarity with MITRE ATT&CK, Cyber Kill Chain, NIST, or other cybersecurity frameworks
  • Experience supporting SOC operations, incident response, malware analysis, forensics, or threat intelligence functions
  • Knowledge of Windows, Linux, networking, authentication, cloud services, and common attacker tooling
  • Certifications such as GCIH, GCIA, GCFA, GNFA, GREM, CISSP, CySA +, Security+, or equivalent experience
ECS Federal LLC is an equal opportunity employer and does not discriminate or allow discrimination on the basis any characteristic protected by law. All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, or local jurisdiction law.

Everforth ECS is the federal segment of Everforth , a $4B global organization with over 10,000 employees. Our nearly 3,500 professionals deliver advanced technology solutions in data and AI, cybersecurity, and enterprise transformation, serving defense, intelligence, and federal civilian agencies.

Our work powers mission-critical outcomes, strengthens technology partnerships, and creates meaningful opportunities for our people. We are defined by a commitment to excellence in delivery, a culture of innovation, and an environment where talent can thrive and grow.

We value:
  • Attracting and developing top talent and high-performing teams
  • Fostering a culture that is engaging, accountable, and mission-driven

Meet the challenge. Make a difference with Everforth ECS!
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: 10112MAN
  • Position Id: 3940
  • Posted 5 hours ago
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Portland, Oregon

Today

Full-time

Portland, Oregon

Today

Full-time

Portland, Oregon

Today

Full-time

Portland, Oregon

Today

Full-time

Search all similar jobs