Get Hired Faster With COMPANY_NAME!
Don't you ever think you landed here by any accident, You are here because you are searching for something bigger. You know what?
- A better Job
- A better Future
- A better Knowledge
- A better Paycheck
- A greater Path to walk on.
And COMPANY_NAME is here to give you exactly what you've been missing for so long. The reality is that most job seekers chase job postings, but successful job seekers attract job offers by chasing the accurate information. Therefore, that's the shift COMPANY_NAME is going to help you make. Here are the top 10 ideas to up-skill yourself, so lean in to begin:
1: COMPANY_NAME Smart Tools and Direct Employer Connections Help Speed Up Your Hiring Process
COMPANY_NAME is a career-changing advantage that most seekers never get access to. Imagine...
- Instead of applying for job after job and still not getting any callbacks, you suddenly bump into a tool that can do the heavy lifting for you.
- Instead of wondering, "What do employers actually want?", you are getting insights straight from the employer's desk.
- Instead of hoping your resume gets noticed, it’s kept on the table of decision-makers who are hiring right now.
That's the difference COMPANY_NAME makes. Our tools will let you reach employers directly, which automatically speeds up your hiring process.
2: With Better Matches, Real-time Job Alerts, and Direct Employer Responses, COMPANY_NAME Helps Many Candidates Secure Interviews and Job Offers Within 15 to 30 Days!
How does COMPANY_NAME make this possible?
On COMPANY_NAME, you get notified for roles aligned with your profile right from the start. When an employer posts a role that matches your qualifications and skills, you’ll know first. When you apply early, your chances of getting noticed and shortlisted increase by 20%.
COMPANY_NAME also offers direct employer responses—no more waiting for weeks. Here you engage with hiring managers who are actively looking for candidates.
When all these features combine in one place, you move from your first match to your first interview within days. And ultimately, from application to offer—all within 15 to 30 days!
3: The Type of Resume You Need to Get Priority Placement
With COMPANY_NAME, you don’t just need a resume—you need a strategy. A system that pushes your name to the right tables. We’ll show you exactly how the most successful candidates take initiative and get noticed.
4: Browse Full-Time, Part-Time, and Freelancing Roles With COMPANY_NAME
The job market isn’t one-size-fits-all—and your career shouldn’t be either. COMPANY_NAME gives you access to a wide range of opportunities including full-time, part-time, and freelancing roles all in one place.
5: COMPANY_NAME Helps You Grow Your Career
COMPANY_NAME provides insights, tools, and role-matching that help you find the right direction, the right skills, and the opportunities aligned with your ambition.
6: The Easiest Way To Find A Job
COMPANY_NAME cuts the noise, the endless scrolling, and the confusion. With accurate matches, direct employer connection, and real-time updates, you get a clear and simple path from application to interview.
7: Find Roles That Offer Growth, Culture & Benefits
COMPANY_NAME helps you find roles where you grow, feel supported, and thrive—not just survive. With us, you discover opportunities that elevate your professional life.
8: Get Support With Resume, Interviews & Career Planning
COMPANY_NAME provides expert guidance on resumes, interviews, and planning so employers instantly recognize your strengths and value.
9: Your Future Starts Today
COMPANY_NAME gives you everything you need—tools, guidance, and opportunities—to step forward confidently and begin a new chapter where your potential is seen and supported.
10: Get Hired Within 15 to 30 Days With COMPANY_NAME
COMPANY_NAME follows a smart, strategic, and proven approach that gets your profile noticed faster and moves you toward interviews and offers within 15 to 30 days.
Threat Hunter
<p><span style="font-weight: bold">Who we are:</span></p> <p><br></p> <p>ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a “work hard, play hard” mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community. </p> <p><br></p> <p><span style="font-weight: bold">The Perks:</span></p> <p><br></p> <p>As recognized members of the Cyber Elite, we work together in partnership to defend our nation’s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 144 hours of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.</p> <p><br></p> <p><span style="font-weight: bold">Who we’re looking for:</span></p> <p><br></p> <p>We are seeking a <span style="font-weight: bold">Threat Hunter</span> to support and enhance our 24/7 Security Operations Center. This role combines advanced threat detection, incident investigation and threat hunting with hands-on development of SIEM use cases, automation and analytics to identify and respond to sophisticated threats, including lateral movement. The ideal <span style="font-weight: bold">Threat Hunter</span> brings strong investigative expertise and a builder mindset to continuously improve detection capabilities and strengthen overall SOC effectiveness. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market.</p> <p><br></p> <p><span style="font-weight: bold">What you’ll be doing: </span></p> <p><br></p> <ul> <li>Provide first-line SOC support, including alert monitoring, triage, routing, escalation and response across 24x7x365 operations.</li> <li>Monitor, analyze and investigate security events, network traffic and host-based detections, distinguishing malicious activity from false positives.</li> <li>Perform proactive and creative threat hunting and anomaly detection across SIEM and security tools, identifying patterns, lateral movement and emerging threats.</li> <li>Conduct incident investigation, Cyber Threat Assessment and Remediation Analysis, including processing and correlating incident indicators with threat intelligence.</li> <li>Tune and develop SIEM correlation rules and detection logic and rapidly build detection use cases in collaboration with incident response (IR) teams.</li> <li>Develop and maintain scripts and tools (Python, Bash) to automate SOC and IR functions, including Indicator of compromise (IoC) ingestion, log processing and SIEM integrations via APIs.</li> <li>Research, develop and maintain dashboards, visualizations and analytics to support detection, reporting and SOC performance monitoring.</li> <li>Produce, review and maintain documentation and reporting, including cybersecurity briefings, metrics, incident reports and deliverables for stakeholders at all levels, ensuring alignment with editorial standards and government specifications.</li> <li>Support threat intelligence operations, including reviewing and actioning IoCs and translating intelligence into actionable detections.</li> <li>Coordinate with internal teams and stakeholders to support engagements such as Insider Threat, Rule of Engagement (ROE), threat hunting, testing activities and after-action reporting.</li> <li>Support SOC operations processes, including ticket tracking, customer security assessments, ad hoc investigations, tabletop exercises and lessons learned activities.</li> <li>Contribute to continuous SOC improvement by enhancing detection capabilities, processes, communication and overall operational effectiveness; participate in on-call rotation.<br></li> </ul> <p><br></p> <p><span style="font-weight: bold">What you need to know: </span><br></p> <p><br></p> <ul> <li>Deep understanding of cyber threat TTPs, threat hunting methodologies and application of the MITRE ATT&CK framework.</li> <li>Experience supporting 24x7x365 SOC operations, including alert monitoring, triage, analysis, response and review/action of threat intelligence and reported incidents.</li> <li>Ability to manage multiple alerts and tickets in parallel, perform end-to-end triage through resolution and appropriately prioritize response actions including coordination with end-users.</li> <li>Strong experience analyzing and correlating security events across multi-source ecosystem, including endpoint, network, email security tools, SIEM platforms and federal threat intelligence (e.g., CISA).</li> <li>Demonstrated proficiency with enterprise security tools and platforms, including but not limited to FireEye, Elastic, Sourcefire, Malwarebytes, Carbon Black/Bit9, Splunk, Prisma Cloud, Cisco IronPort, Bluecoat, Palo Alto, Cylance and OSSEC.</li> <li>Hands-on experience with enterprise SIEM or security analytics platforms (e.g., Elastic Stack, Splunk), including log analysis, event correlation and detection support.</li> <li>Experience with malware analysis and understanding of attack vectors involving malware, data exposure, phishing and social engineering techniques.</li> <li>Experience developing and maintaining SOPs, performing event timeline analysis and investigating logs across Windows/Linux environments and network security devices.</li> </ul> <p><br></p> <p><span style="font-weight: bold">Must have’s: </span></p> <p><br></p> <ul> <li>5+ years of technical experience.</li> <li>Ability to support working hours: 8:45 AM - 5:15 PM Eastern Time</li> <li>Ability to participate in a rotating SOC on-call; rotation is based on number of team members.</li> <li>Demonstrated proficiencies with one or more toolsets such as Bit9/CarbonBlack, CrowdStrike, FireEye ETP, Elastic Kibana.</li> <li>Solid understanding and experience analyzing security events generated from security tools and devices such as: Carbon Black, CrowdStrike, FireEye, Palo Alto, Cylance and OSSEC.</li> </ul> <p><br></p> <p><span style="font-weight: bold">Beneficial to have:</span></p> <p><br></p> <ul> <li>Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, Mathematics, Engineering or a related field.</li> <li>One or more of the following certifications: GIAC (GCIH, GCFE, GCFA, GREM, GNFA, GCTI, GPEN, GWAPT), CEPT, CASS, CWAPT or CREA.<br></li> </ul> <p><br></p> <p><span style="font-weight: bold">Where it’s done: </span><br></p> <p><br></p> <ul> <li>Remote (Herndon, VA)</li> </ul><br><hr><div class="fabric-5qovnk-root MuiBox-root css-witlqh" data-fabric-component="Flex"><div class="fabric-5qovnk-root MuiBox-root css-1phs5iq" data-fabric-component="Flex"><div class="fabric-2lfz5e-root MuiBox-root css-jipda8" data-fabric-component="LayoutBox"><p class="fabric-v3bc9l-root" data-fabric-component="BodyText">Location</p></div><div class="fabric-15808a6-root MuiBox-root css-4cxybv" data-fabric-component="LayoutBox"><p class="fabric-958q8r-root" data-fabric-component="BodyText">Herndond, Virginia (Remote)</p></div><hr class="MuiDivider-root fabric-jcid1o-root MuiDivider-fullWidth MuiBox-root css-40h3v3" data-fabric-component="Divider"></div><div class="fabric-5qovnk-root MuiBox-root css-1phs5iq" data-fabric-component="Flex"><div class="fabric-2lfz5e-root MuiBox-root css-jipda8" data-fabric-component="LayoutBox"><p class="fabric-v3bc9l-root" data-fabric-component="BodyText">Department</p></div><div class="fabric-15808a6-root MuiBox-root css-4cxybv" data-fabric-component="LayoutBox"><p class="fabric-958q8r-root" data-fabric-component="BodyText">Staff</p></div><hr class="MuiDivider-root fabric-jcid1o-root MuiDivider-fullWidth MuiBox-root css-40h3v3" data-fabric-component="Divider"></div><div class="fabric-5qovnk-root MuiBox-root css-1phs5iq" data-fabric-component="Flex"><div class="fabric-2lfz5e-root MuiBox-root css-jipda8" data-fabric-component="LayoutBox"><p class="fabric-v3bc9l-root" data-fabric-component="BodyText">Employment Type</p></div><div class="fabric-15808a6-root MuiBox-root css-4cxybv" data-fabric-component="LayoutBox"><p class="fabric-958q8r-root" data-fabric-component="BodyText">Full-Time</p></div><hr class="MuiDivider-root fabric-jcid1o-root MuiDivider-fullWidth MuiBox-root css-40h3v3" data-fabric-component="Divider"></div><div class="fabric-5qovnk-root MuiBox-root css-1phs5iq" data-fabric-component="Flex"><div class="fabric-2lfz5e-root MuiBox-root css-jipda8" data-fabric-component="LayoutBox"><p class="fabric-v3bc9l-root" data-fabric-component="BodyText">Minimum Experience</p></div><div class="fabric-15808a6-root MuiBox-root css-4cxybv" data-fabric-component="LayoutBox"><p class="fabric-958q8r-root" data-fabric-component="BodyText">Experienced</p></div><hr class="MuiDivider-root fabric-jcid1o-root MuiDivider-fullWidth MuiBox-root css-40h3v3" data-fabric-component="Divider"></div></div>