cFocus Software seeks a Threat Intelligence/Threat Hunting Analyst to join our program supporting the Federal Communications Commission (FCC). This position is remote. This position requires the ability a Public Trust clearance. Qualifications:
Bachelor’s degree in Cybersecurity, Information Technology, or related field (or equivalent experience).
Experience in threat intelligence, threat hunting, or cybersecurity operations.
Experience analyzing logs, network traffic, and endpoint data.
Knowledge of MITRE ATT&CK framework and cyber threat lifecycle.
Familiarity with NIST frameworks and RMF processes.
Strong analytical and investigative skills.
Experience with SIEM platforms (e.g., Splunk, QRadar).
Experience with EDR/XDR tools.
Scripting skills (Python, PowerShell) for automation and analysis.
Knowledge of cloud security monitoring.
Strong written and verbal communication skills.
Required Certifications
Role-appropriate cybersecurity certifications (e.g., Security+, CySA+, CEH, GCIH, or equivalent).
Additional certifications in threat intelligence or incident response are preferred.
Duties:
Conduct proactive threat hunting across enterprise networks, endpoints, and cloud environments.
Analyze threat intelligence feeds, indicators of compromise (IOCs), and tactics, techniques, and procedures (TTPs).
Correlate data from SIEM, EDR, and other security tools to detect malicious activity.
Develop and refine detection rules, use cases, and hunting methodologies.
Investigate security incidents and support incident response activities.
Produce threat intelligence reports and briefings for stakeholders.
Track emerging threats and assess potential impact to the organization.
Support continuous monitoring, RMF processes, and compliance reporting.
Collaborate with SOC, vulnerability management, and engineering teams