Job Description
Everforth ECS is seeking a SOC Threat Hunter to work in our Portland, OR office. Please Note: This position is contingent upon contract award.
The Threat Hunter proactively identifies, investigates, and helps mitigate advanced cyber threats that may evade automated detection and traditional monitoring. This role develops threat hypotheses, analyzes endpoint, network, cloud, identity, and security event data, and conducts structured hunts to uncover suspicious behaviors, attacker techniques, and control gaps.
The ideal candidate has strong analytical skills, hands-on experience with security monitoring and investigation tools, and the ability to translate threat research into repeatable hunt procedures, detection improvements, and actionable findings for SOC, incident response, engineering, and threat intelligence stakeholders.
Key Responsibilities
Threat Hunting & Analysis
- Develop and execute hypothesis-driven hunts across enterprise, cloud, endpoint, identity, and network data sources
- Analyze anomalous behavior, suspicious activity, and attacker tactics, techniques, and procedures (TTPs)
- Use SIEM, EDR, network, log analytics, and threat intelligence tools to identify potential compromise or unauthorized activity
- Validate hunt findings, assess potential impact, and determine whether escalation to incident response or SOC operations is required
Detection Development & Improvement
- Translate hunt findings into detection logic, analytic requirements, alert tuning recommendations, and monitoring use cases
- Identify gaps in logging, visibility, correlation logic, and alert coverage
- Partner with SOC analysts, Splunk engineers, security engineers, and threat intelligence analysts to improve detection fidelity and coverage
- Support development of repeatable hunt playbooks, queries, dashboards, and analytic procedures
Threat Research & Intelligence Application
- Research emerging threats, adversary behaviors, malware trends, vulnerabilities, and exploitation techniques relevant to the environment
- Map threat activity and hunt hypotheses to recognized frameworks such as MITRE ATT&CK
- Incorporate threat intelligence into hunt planning, detection enhancement, and investigative workflows
- Provide feedback to threat intelligence teams on observed activity, intelligence gaps, and collection priorities
Investigation Support & Escalation
- Support advanced investigations by correlating security events, system activity, user behavior, and contextual data
- Document investigative steps, evidence, conclusions, and recommended follow-up actions
- Coordinate with SOC Tier 2 and Tier 3 analysts, forensics personnel, and incident response teams during escalations
- Assist with post-incident hunt activity to identify related indicators, lateral movement, persistence, or additional affected assets
Reporting & Continuous Improvement
- Produce clear hunt reports, summaries, findings, and recommendations for technical and leadership audiences
- Track hunt outcomes, recurring patterns, detection gaps, and operational metrics
- Contribute to continuous improvement of SOC processes, analytic standards, and knowledge management resources
- Stay current with adversary tradecraft, detection engineering practices, and security analytics techniques