HS

Hunter Strategy

1-10 employees

WebsiteLinkedIn
information-technology-and-services
agile
cloud-engineering
enterprise-architecture
enterprise-software
information-securitycyber-security
information-technology
services
software-engineering
solutions-consulting
validation
About Hunter Strategy

Hunter Strategy is a HUBZone-certified technology company based in Washington, D. C. Since our founding in 2014, we have been providing computer software integration services to several Government agencies and commercial firms. We provide strategic technical services to help execute your most complex challenges by leveraging years of experience in delivering complex services for the worlds most demanding customers. We offer excellent benefits, self directed opportunities and a small company environment to our employees. We are passionate about rewarding hard working technologists who enjoy what they do. We have exciting projects and opportunities and take a 'best athlete'​ approach to hiring and staffing.

3 months ago

Cybersecurity Data Analyst

Full-time
Mid Level
Cybersecurity Data Analyst
Report problem

📋

Description
  • Hunter Strategy has a unique philosophy to technical project delivery, focusing on complex software engineering, cloud operations, and cyber risk management solutions.
  • The Cybersecurity Data Analyst will play a critical role in analyzing cybersecurity datasets, developing Splunk SPL queries, conducting statistical analysis, and supporting federal cybersecurity compliance activities.
  • Responsibilities include authoring Splunk queries, analyzing activity patterns, supporting FISMA and NIST assessments, conducting event log analysis, and using frameworks like MITRE ATT&CK for threat detection.
  • The role requires hands-on experience with Splunk, statistical analysis, and compliance tasks, along with active public trust clearance or the ability to obtain one.
  • The position is remote within the United States.

🎯

Requirements
  • Demonstrated ability to author Splunk SPL queries from scratch.
  • Experience using Splunk as a primary tool for data interrogation and analysis.
  • At least 1 year of experience performing statistical analysis on large datasets.
  • Experience analyzing patterns to determine unusual behavior and outliers.
  • Minimum 2 years of experience conducting federal cybersecurity compliance assessments with NIST 800-53 Rev. 4 or newer.
  • Minimum 2 years of experience performing FISMA compliance assessments.
  • Hands-on experience with vulnerability scanning analysis, patch management, and security control testing.
  • Minimum 2 years in a customer-facing role assessing compliance and providing recommendations.
  • Experience identifying and mapping enterprise data flows.
  • Experience with event log analysis and SIEM tools, primarily Splunk.
  • Active Public Trust Clearance or ability to obtain one.
  • Experience as a Tier II SOC Analyst or Hunt Team member (preferred).
  • Experience with compliance scanning tools like Tenable Nessus (preferred).
  • Knowledge of the MITRE ATT&CK Framework (preferred).
  • Background in network operations or cybersecurity with at least 3 years of experience, including 1 year in data analysis.
  • Supporting RMF processes and authorization activities.
  • Familiarity with additional frameworks like FedRAMP, CMMC, NIST CSF.
  • Strong communication and customer relationship skills.

🏖️

Benefits
  • Remote work within the United States.
  • Support for federal cybersecurity initiatives.
  • Opportunities to work with advanced cybersecurity frameworks and tools.
  • Potential for career growth in cybersecurity and compliance fields.