Threat Hunting Analyst

Cyber Security
Top Secret



Secondary Location:


Telecommute Options:

Flexible for occasional telework – must be local to work location
Join Our Team
Apply now
right arrow
Share on your newsfeed or with a friend
About Peraton

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit to learn how we’re keeping people around the world safe and secure.


Peraton is seeking a Threat Hunting Analyst to join our team of qualified and diverse individuals. The qualified applicant will become part of Department of State (DOS) Consular Affairs Enterprise Infrastructure Operations (CAEIO) Program, for the Bureau of Consular Affairs (CA). CAEIO provides IT Operations and Maintenance to modernize the legacy networks, applications, and databases supporting CA services globally.



  • Conduct in-depth threat hunts to detect and analyze sophisticated threats that evade traditional security solutions.
  • Plan and scope threat hunt missions to build and verify hypotheses.
  • Conduct research and data correlation using a variety of enterprise data sources with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures.
  • Analyze network events to determine the impact on current operations and conduct research to determine adversary capability and intent.
  • Analyze identified malicious network and system log activity to determine weaknesses exploited, exploitation methods, effects on systems and information.
  • Collect and analyze network device integrity data for signs of tampering or compromise.
  • Prepare assessments and cyber threat profiles of current events based on the sophisticated collection, research, and analysis of threat intelligence.
  • Develop and maintain analytical procedures to meet changing requirements and customer inquiries.
  • Serve as the cyber technical liaison to stakeholders, explaining investigation details.
  • Track and document hunt activities and provide updates to leadership through executive summaries and in-depth technical reports.
  • Create, discuss, and explain Cyber investigative processes, procedures, and documentation.
  • Resolve highly complex malware and intrusion issues using computer host analysis, forensics, and reverse engineering.

Core Work Schedule: First shift, Monday - Friday, 7:00 AM ET - 3:00 PM ET


Work Location: This position is hybrid with remote work and up to two days per week in the office in Sterling, VA or Washington, DC.


Required Qualifications

  • U.S. citizenship and an active TOP SECRET clearance.
  • GIAC or similar cybersecurity certification.
  • Ability to resolve highly complex malware and intrusion issues using computer host analysis, forensics, and reverse engineering.
  • Solid communications skills, both written and verbal. Able to create, discuss and explain Cyber investigative documentation.
  • 8+ years of directly relevant experience in cyber forensic and network investigations using leading edge technologies and industry standard forensic tools.
  • Experience with reconstructing a malicious attack or activity.
  • Ability to characterize and analyze network traffic, identify anomalous activity / potential threats, and analyze anomalies in network traffic using metadata.
  • In-depth knowledge and experience of identifying different classes and characterization of attacks and attack stages.
  • Ability to track incidents using MITRE ATT&CK and/or TTP-based methodology.

Desired Qualifications

  • Knowledge of cybersecurity frameworks and standards.
  • Knowledge of Threat Intelligence Platforms (TIPs) and integration of threat intel feeds.
  • Knowledge of cloud security.
  • Knowledge of current IT security best practices.
  • Knowledge of system administration, networking, and operating system hardening techniques.
  • Knowledge of detection engineering.
  • Mixed operating systems experience: (Linux, Windows).
  • Scripting/coding experience.

Education and Experience: High school diploma or equivalent and at least 12 years of work experience; Associate's degree and at least 10 years of experience; Bachelor's degree and 8 years of experience; Master's degree and 6 years of experience.

Target Salary Range

$146,000 - $234,000. This represents the typical salary range for this position based on experience and other factors.
SCA / Union / Intern Rate or Range


An Equal Opportunity Employer including Disability/Veteran.

Our Values


At Peraton, our benefits are designed to help keep you at your best beyond the work you do with us daily. We’re fully committed to the growth of our employees. From fully comprehensive medical plans to tuition reimbursement, tuition assistance, and fertility treatment, we are there to support you all the way.

  • Paid Time-Off and Holidays
  • Retirement
  • Life & Disability Insurance
  • Career Development
  • Tuition Assistance and Student Loan Financing
  • Paid Parental Leave
  • Additional Benefits
  • Medical, Dental, & Vision Care
Happy man with his two children