Platzhalter Bild

Cyber Security Threat Hunter, Tier 3 presso Gdit

Gdit · Tampa, Stati Uniti d'America · Onsite

Candidarsi ora

This is an unpaid fellowship through the Department of Defense (DoD) SkillBridge Program. The fellow selected for this role will not receive compensation or benefits from GDIT and will not be an employee, agent or contractor of GDIT but rather will remain an employee of the DoD and will receive compensation and benefits through the DoD.

Type of Requisition:

Pipeline

Clearance Level Must Currently Posses:

Top Secret/SCI

Clearance Level Must Be Able To Obtain:

Top Secret/SCI

Public Trust/Other Required:

None

Job Family:

Cyber and IT Risk Management

Job Qualifications:

Skills:

Cyber Defense, General Data Protection Regulation (GDPR), SIEM Tools

Certifications:

None

Experience:

5 + years of related experience

US Citizenship Required:

Yes

Job Description:

Through the DoD SkillBridge Program, GDIT offers transitioning service members the opportunity to gain hands-on experience as a Cyber Security Threat Hunter, Tier 3 Fellow. In this fellowship, you’ll support real-world cyber missions, learn from seasoned threat hunters, and contribute to the defensive cyber operations that secure USCENTCOM networks. You’ll work directly with advanced cyber teams while building the skills needed for a successful transition into the civilian cybersecurity workforce.

A Cyber Security Threat Hunter, Tier 3 Fellow proactively identifies, investigates, and mitigates advanced cyber threats targeting enterprise networks. You will support senior hunters in developing threat-hunting strategies, analyzing security events, and enhancing detection capabilities across mission-critical systems.

HOW A CYBER SECURITY THREAT HUNTER, TIER 3 FELLOW WILL MAKE AN IMPACT:

  • Conduct proactive threat-hunting activities to uncover hidden adversary behaviors across SIEM, SOAR, EDR, and threat intelligence platforms.

  • Support investigations of cyber incidents by analyzing logs, packets, host telemetry, and malware indicators.

  • Assist in gathering and interpreting threat intelligence to identify emerging tactics, techniques, and procedures (TTPs).

  • Create and test hunting hypotheses aimed at detecting stealthy threat actors who evade conventional security controls.

  • Help develop automation scripts and analytical tools using Python, PowerShell, or Bash to improve efficiency and detection coverage.

  • Maintain documentation to support reporting requirements, operational workflows, and analytical methodologies.

  • Collaborate with incident response, SOC teams, and IT counterparts to validate findings and strengthen defensive measures.

  • Participate in threat briefings and help convert complex technical observations into actionable insights for stakeholders.

  • Contribute to team knowledge-sharing activities and assist in mentoring junior analysts as part of a collaborative cyber defense environment.

WHAT YOU’LL NEED TO SUCCEED:

  • Education: Bachelor of Arts/Bachelor of Science in Cybersecurity, Information Technology, or related field (Equivalent experience may be considered.)

  • Required Experience: 5+ years of related cybersecurity or IT experience

  • Technical Skills & Knowledge:

    • Strong understanding of cyber threat intelligence frameworks, including MITRE ATT&CK

    • Experience with SIEM (Splunk/ArcSight), SOAR, and Endpoint Detection & Response tools

    • Understanding of malware behavior, adversary TTPs, and attack vectors

    • Familiarity with scripting/programming (Python, PowerShell, Bash)

    • Ability to analyze large volumes of data to detect anomalies and suspicious activity

    • Strong analytical and problem-solving skills under pressure

    • Effective written and verbal communication skills for technical and non-technical audiences

    • Familiarity with Microsoft and Linux operating systems, SharePoint, and general IT fundamentals

  • Preferred Skills:

    • Experience working with cloud security technologies (AWS, Azure, GCP)

    • Knowledge of AI development, prompt engineering, and AI-driven automation

    • Understanding of compliance frameworks (NIST, ISO 27001, GDPR)

    • Familiarity with Docker, containerization, and virtualization environments

REQUIREMENTS:

  • Security Clearance: Active TS/SCI

  • Certification: Security+ CE or DoD 8140/8570 equivalent

  • Citizenship: U.S. Citizenship required

  • Location: Onsite

DoD SkillBridge Eligibility:

  • Has served at least 180 days on active duty

  • Can participate within the last 6 months of separation or retirement

  • Will receive an honorable discharge

  • Has taken any service TAP/TGPS

  • Has attended or participated in an ethics brief within the last 12 months

Received Unit Commander (first O-4/Field Grade commander in chain of command) written authorization and approval to participate in DoD SkillBridge Program prior to start of the fellowship.

Scheduled Weekly Hours:

40

Travel Required:

None

Telecommuting Options:

Onsite

Work Location:

USA FL MacDill AFB

Additional Work Locations:

We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.

Join our Talent Community to stay up to date on our career opportunities and events at

Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans Candidarsi ora

Altri lavori