Ardent MC
Ardent MC~13d ago

Tier III Analyst/Threat Hunter

Washington, D.C. Metro - hybrid/remoteRemotemid
CybersecurityThreat Hunter
1 views0 saves0 applied

Quick Summary

Key Responsibilities

Lead complex incident investigations and provide advanced analysis and response support. Conduct proactive threat hunting activities to identify emerging threats and adversary behavior.

Requirements Summary

Must be a U.S. Citizen. Bachelor’s degree in Cybersecurity, Information Technology, or a related field (or equivalent experience).

Technical Tools
CybersecurityThreat Hunter

At Ardent, we hire people who want more than a job — they want to serve a mission that matters. Our teams support the federal government’s most critical national security and defense priorities, helping protect the nation, strengthen resilience, and advance the technologies and capabilities that keep America secure. For veterans, cleared professionals, and purpose-driven innovators, Ardent is a place to continue serving alongside a team that understands the importance of the mission and the people behind it.

We also know top talent has choices, which is why we back our mission with benefits and flexibility that stand out: competitive pay, comprehensive health coverage, flexible PTO, federal holidays off, tuition reimbursement, professional development support, wellness stipends, and a culture that values and rewards hard work, dedication, and adaptability. If you want to build something meaningful, while enjoying the kind of flexibility and support that you need to do your best work — Ardent is where your next mission begins.


Ardent is seeking a Tier III Analyst to support advanced incident response and proactive threat hunting within a Virtual Security Operations Center (vSOC) environment. This role focuses on handling complex security incidents, conducting in-depth investigations, and identifying advanced threats across enterprise systems. The analyst will perform threat hunting activities, support digital forensics, and provide root cause analysis to strengthen overall security posture. This position requires strong analytical capabilities, deep experience in security operations, and the ability to operate in a fast-paced, mission-driven environment.

Responsibilities

~2 min read
  • Lead complex incident investigations and provide advanced analysis and response support.
  • Conduct proactive threat hunting activities to identify emerging threats and adversary behavior.
  • Perform root cause analysis and develop detailed incident reports.
  • Support digital forensics and malware analysis efforts.
  • Analyze endpoint, network, and identity telemetry to detect anomalous behavior.
  • Integrate threat intelligence and red team findings into detection and response workflows.
  • Provide escalation support and guidance to Tier I and Tier II analysts.
  • Develop and refine detection use cases based on observed threats and trends.
  • Document investigation processes, findings, and recommendations.
  • Collaborate with engineering teams to improve detection and response capabilities.

Requirements: 

  • Must be a U.S. Citizen.
  • Bachelor’s degree in Cybersecurity, Information Technology, or a related field (or equivalent experience).
  • 4+ years of experience in cybersecurity operations or incident response.
  • Experience handling complex security incidents and conducting threat investigations.
  • Experience performing threat hunting and root cause analysis.
  • Experience with SIEM platforms, preferably Microsoft Sentinel.
  • Experience analyzing logs, alerts, and security telemetry across multiple domains.
  • Strong analytical and critical thinking skills.
  • Ability to communicate findings clearly to technical and non-technical stakeholders.

Preferred Qualifications: 

  • GCIA, GCIH, CEH, CISSP, or equivalent cybersecurity certification.
  • Microsoft Sentinel or Microsoft security platform certification.
  • Experience with digital forensics and malware analysis.
  • Experience supporting federal or government security operations environments.
  • Experience working in secure or compliance-driven environments.

Due to the nature of the work we support, all candidates in consideration for this role must be willing to undergo and maintain a government-issued background investigation process. We highly encourage all Veterans and those with disabilities to apply.


Ardent is an equal opportunity employer. We will not discriminate in employment, recruitment, advertisements for employment, compensation, termination, upgrading, promotions, and other conditions of employment against any employee or job applicant on the bases of race, color, gender, national origin, age, religion, creed, disability, veteran's status, sexual orientation, gender identity, gender expression, or any other basis protected by state, local, or federal law.

Location & Eligibility

Where is the job
Worldwide
Fully remote, anywhere in the world
Who can apply
Same as job location
Listed under
Worldwide

Listing Details

First seen
April 21, 2026
Last seen
May 4, 2026

Posting Health

Days active
13
Repost count
0
Trust Level
35%
Scored at
May 4, 2026

Signal breakdown

freshnesssource trustcontent trustemployer trust
Ardent MC
Ardent MC
greenhouse
Employees
125
Founded
2006
View company profile
Newsletter

Stay ahead of the market

Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.

A
B
C
D
Join 12,000+ marketers

No spam. Unsubscribe at any time.

Ardent MCTier III Analyst/Threat Hunter