Cyber Threat Analyst III (Remote)
Job ID: 111945
Location: Reston , Virginia [On-Site]
Category: App/Dev
Employment Type: Contract
Date Added: 01/30/2026
Cyber Security Specialist III
Overview:
Join our dynamic cybersecurity team as a Cyber Security Specialist III, where you will play a critical role in safeguarding our digital assets through advanced threat detection, incident response, and innovative automation. Based remotely, you will leverage your extensive experience to enhance our security posture, employ cutting-edge AI/ML technologies, and contribute to a resilient cyber defense strategy.
Key Responsibilities:
- Conduct triage on all security escalations and detections to determine scope, severity, root cause, and appropriate response actions.
- Monitor cyber security events across various platforms, promptly detecting and investigating security incidents to mitigate risks.
- Develop and implement automation use cases utilizing AI and Machine Learning capabilities, streamlining threat detection and response processes.
- Support deployment, configuration, testing, and ongoing maintenance of Security Orchestration, Automation, and Response (SOAR) platforms and integrated security tools.
- Collaborate effectively with the Program Manager and cross-functional teams, providing technical support and insights.
- Communicate complex technical findings clearly to non-technical stakeholders, fostering awareness and compliance.
- Influence and guide security policy adherence and best practices across teams to ensure a proactive security environment.
- Perform vulnerability assessments, analyzing network traffic, and configuring network devices to detect and prevent threats.
- Research, develop, and refine detection signatures and use cases aligned with cybersecurity frameworks such as MITRE ATT&CK and NIST.
- Analyze alerts from diverse sources including SIEM, EDR, XDR, cloud security tools, and endpoint solutions, tuning alert systems for optimal performance.
- Evaluate hardware and software for compliance, performance, and security standards.
- Stay updated on emergent threats and implement improvements based on current cyberattack trends and CVE discoveries.
Qualifications:
- 8+ years of experience in security operations, threat hunting, incident response, or related fields.
- Proven expertise in analyzing alerts from Cloud, SIEM, EDR, and XDR solutions, with preferred experience in SentinelOne, Armis, and Splunk.
- Skilled in network security, including configuring network devices and analyzing network traffic for suspicious activity.
- Hands-on experience with AI/ML-based security tools and developing automation workflows with SOAR platforms.
- Familiarity with cybersecurity frameworks such as MITRE ATT&CK and NIST, translating them into actionable monitoring and detection solutions.
- Strong scripting and signature development skills to respond swiftly to emerging threats.
- Certifications such as CISSP, CISA, CISM, GIAC, or RHCE are strongly preferred.
- Capacity to perform vulnerability assessments, host analysis across platforms (Windows, UNIX, Linux), and implement dynamic risk-based alerting.
Preferred Skills:
- Knowledge of vulnerability management, incident response procedures, and threat intelligence.
- Experience with cloud security infrastructure and hybrid environments.
- Ability to adapt to evolving cybersecurity technologies and practices.
Prerequisites:
- Must be legally authorized to work in the United States without employer sponsorship, now or in the future.
- Ability to pass a strict security clearance process.
- Less than six months of international travel outside the U.S. within the past five years.
- Willingness to work overtime with prior approval and adherence to dress code standards.
Join us and be part of a forward-thinking team dedicated to pioneering cybersecurity innovation—protecting critical systems and advancing your career in a challenging, rewarding environment.
