Security Operations Center; SOC Lead – Threat & Detection Engineering
Listed on 2026-03-12
-
IT/Tech
Cybersecurity
Refer a friend:
Referral fee program
Career Developers Inc., a distinguished staffing and consulting firm, is proud to celebrate 30 years of service excellence. As a GSA Contract holder, we offer comprehensive staffing solutions for both commercial and government sectors nationwide. By selectively partnering with clients who share our values, we ensure productive collaborations that set us apart in the industry. Our dedication to candidates involves managing expectations with precision through business intelligence, thorough interview preparation, transparent communication, and exceptional feedback throughout the process.
We are committed to advancing your career and look forward to supporting your professional growth.
Security Operations Center (SOC) Lead – Threat Hunting & Detection EngineeringLocation: Reston, VA (Hybrid 3 days a week - Tues/Wed/Thurs)
Salary: 180-200K + 7-10% Bonus
Must have the following: SIEM (Splunk/QRadar), EDR (Crowd Strike/Sentinel One), Threat Hunting, MITRE, MDR oversight, Security Tool Engineering
Responsibilities- Lead and mature SOC operations with a strong focus on proactive threat hunting and advanced detection
- Design, install, configure, and maintain security tools including EDR, SIEM, MDR integrations, and email security gateways
- Conduct hypothesis-driven threat hunts across endpoints, networks, and cloud environments
- Identify indicators of compromise (IOCs), advanced persistent threats (APTs), and anomalous behaviors
- Research emerging threats and adversary tactics to enhance detection capabilities using MITRE Telecommunication&CK framework
- Develop and refine monitoring use cases in partnership with the MDR provider
- Oversee day-to-day SOC operations, ensuring optimal performance of security infrastructure
- Troubleshoot security incidents and lead incident response coordination
- Serve as technical lead for SOC-related engineering initiatives
- Bachelor's degree in Cybersecurity, Computer Science, or related field
- 6–8+ years designing, implementing, and operating enterprise security tools in complex environments
- 2+ years of focused experience in threat hunting or advanced detection engineering
- Hands-on experience with SIEM platforms (Splunk, QRadar), EDR tools (Crowd Strike, Sentinel One), and log analysis
- Deep understanding of adversary tactics, techniques, and procedures (TTPs) and frameworks such as MITRE Telecommunication&CK
- Experience in regulated industries, preferably financial services
- Strong analytical, troubleshooting, and communication skills
- Ability to collaborate cross-functionally and build strong working relationships
- Must be authorized to work in the United States
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).