Overview
We are seeking a Senior Cyber Capability Developer to support mission-critical cybersecurity and threat detection efforts. In this role, you will apply deep technical expertise to analyze cyber threat activity, develop capabilities, and enhance defensive operations using platforms such as Splunk and Microsoft Sentinel. You will work closely with cybersecurity teams, stakeholders, and law enforcement partners to identify vulnerabilities, evaluate risk, and strengthen cyber resilience.
This position requires strong analytical skills, hands-on technical experience, and a proven ability to work in dynamic cyber environments.
Key Responsibilities
- Analyze cyber threat data including network traffic, malicious binaries, memory dumps, and disk images.
- Conduct static and dynamic malware analysis, reverse engineering, and functional analysis of compiled software, scripts, and firmware.
- Support development and enhancement of cyber capabilities across multiple environments.
- Use Splunk and Microsoft Sentinel for threat monitoring, detection engineering, alerting, and security analytics.
- Monitor security environments and identify gaps, vulnerabilities, and emerging threats from an adversarial perspective.
- Collaborate with cybersecurity, SOC, and software development teams to develop solutions and implement mitigation strategies.
- Perform forensic analysis to support investigations and incident response activities.
- Provide recommendations to improve defensive posture, threat visibility, and incident detection.
- Participate in planning, implementing, upgrading, and monitoring security measures protecting networks, systems, and data.
- Contribute to documentation, reporting, and communication of findings to technical and non-technical stakeholders.
Required Qualifications
- Bachelor’s degree (BS or BA required).
- 8+ years of professional experience in cybersecurity, cyber intrusion analysis, digital forensics, malware analysis, or related fields.
- Hands-on experience with:
- Splunk (required)
- Microsoft Sentinel (required)
- Experience working in a Security Operations Center (SOC) or similar operational cybersecurity role.
- Experience analyzing malicious software, network traffic, and cyber threat activity.
- Experience with system vulnerability assessment and risk mitigation strategies.
- Ability to respond to security incidents, breaches, and active threats.
- Experience collaborating in team-based software development or cyber environments.
- Strong ability to direct, manage, and contribute to technical activities to ensure customer requirements are met.
- Active Top Secret security clearance required.
Preferred Qualifications
- Splunk certifications (ES, Core, Power User, etc.).
- Microsoft Sentinel certification(s).
- One or more GIAC certifications:
- GIAC Continuous Monitoring (GMON)
- GIAC Certified Incident Handler (GCIH)
- GIAC Forensic Analyst (GCFA)
- GIAC Intrusion Analyst (GCIA)
- GIAC Network Forensic Analyst (GNFA)
Job Type: Full-time
Pay: $145,000.00 - $170,000.00 per year
Work Location: In person