Skip to content
mimi

Cybersecurity Analyst - Investigation, Threat Hunting - Jr/Mid Level

SES

Reston · Hybrid Full-time Mid Level 4d ago

About the role

Cybersecurity Analyst - Investigation, Threat Hunting - Jr/Mid Level

Hybrid/Onsite: 3 days per week, Reston, VA
Employment Type: FTE (No C2C)
Experience Required: 3-5 years

Top 5 Technical Skills

  • Cybersecurity
  • Security event analysis
  • SIEM experience (Security Information and Event Management)
  • Core networking concepts (TCP/IP, DNS, HTTP/HTTPS)
  • Threat Hunting

Job Description

We are seeking a Cyber Investigations Analyst to support Insider Threat detection, investigation, and response to activities focused on technical and behavioral insider risk. This role will conduct end-to-end investigations including triage, evidence collection, timeline development, and documentation aligned to investigation standards. The analyst will perform hypothesis-driven threat hunting and analysis using SIEM and enterprise telemetry, with a strong understanding of SOC operations, log analysis, and core networking concepts. (TCP/IP, DNS, HTTP/S) The role requires knowledge of insider threat categories such as IP theft, fraud, sabotage, espionage, and unintentional risk, including accidental disclosure. The analyst will identify behavioral indicators of risk, support cross-functional response workflows, and contribute to governed documentation, metrics, and reporting.

Benefits

SES hires W2 benefitted and non‑benefitted consultants. Our contract employee benefits include:

  • Group medical, dental, vision, life, LT and ST disability insurance
  • 21 days of accrued paid time off
  • 401(k)
  • Tuition reimbursement
  • Performance bonuses
  • Paid overtime
  • And more

Contact

Please contact me to discuss the details of this position further.

  • Please forward resume directly to for immediate consideration – rstarinieri at sesc .com

I look forward to speaking with you soon!

Robin Starinieri
Director of Recruiting
Systems Engineering Services

Requirements

  • SIEM experience
  • Core networking concepts. (TCP/IP, DNS, HTTP/S)
  • Knowledge of insider threat categories such as IP theft, fraud, sabotage, espionage, and unintentional risk, including accidental disclosure.

Responsibilities

  • Conduct end-to-end investigations including triage, evidence collection, timeline development, and documentation aligned to investigation standards.
  • Perform hypothesis-driven threat hunting and analysis using SIEM and enterprise telemetry, with a strong understanding of SOC operations, log analysis, and core networking concepts.
  • Identify behavioral indicators of risk, support cross-functional response workflows, and contribute to governed documentation, metrics, and reporting.

Benefits

medical insurancedental insurancevision insurancelife insurancelong term disability insuranceshort term disability insurancepaid time off401ktuition reimbursementperformance bonusespaid overtime

Skills

CybersecurityDNSHTTPIPSecurity event analysisSIEMTCP

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free