Full-Time

Defensive Security Analyst-Washington

DC

Posted on 3/12/2025

SpecterOps

SpecterOps

201-500 employees

Adversary emulation, penetration testing, threat hunting.

Compensation Overview

$110k - $160k/yr

Washington, DC, USA

Hybrid

Hybrid role; on-site Washington, DC; 9:00 AM–6:00 PM ET; after-hours/weekend incident response as needed.

US Top Secret Clearance Required

Category
IT & Security (1)
Required Skills
PowerShell
Bash
Python
AWS
Requirements
  • Current TS/SCI Clearance
  • Have the following operating hours: Monday through Friday, 9AM - 6PM US Eastern Time on site at Washington DC location. Be available for after-hours or weekend work in urgent incident response scenarios
  • Established experience in operating in SOC environment, either through relevant experience or qualifications
  • Knowledge of operating and maintaining a SIEM
  • Knowledge of cloud architectures, particularly AWS
  • Provide expertise in a supporting capacity for incident response activities and digital forensics state preservation, including the capture and preservation of system logs, volatile memory captures, and hard drive (physical or virtual) image captures
  • Experience with programming or scripting languages such as PowerShell, Python, and Bash
  • Conduct host forensics, network, forensics, log analysis, and malware triage in support of hunt operations
  • Interface with client contact(s) and staff in a constructive and professional manner
  • Utilize common forensic and incident response tools
  • Develop comprehensive and accurate reports and presentations for both technical and executive audiences
Responsibilities
  • Independently support the client engineering, managing, and monitoring Security Operations Center systems on site at the client location
  • Operate in a SOC environment, including monitoring, analyzing, and responding to security events
  • Support incident response activities and digital forensics state preservation including capture and preservation of logs, memory, and disk images
  • Conduct host forensics, network forensics, log analysis, and malware triage in support of hunt operations
  • Develop comprehensive reports and presentations for technical and executive audiences
  • Interfacing with client personnel and staff in a constructive and professional manner
  • Utilize common forensic and incident response tools
  • Stay current with latest security technologies and techniques; learn new technologies quickly
Desired Qualifications
  • Experience in penetration testing
  • Ability to quickly learn new technologies and stay current with the latest technologies
  • Ability to train others on forensic and incident response techniques and tools

SpecterOps provides cybersecurity services that focus on understanding and countering attacker tactics, including adversary simulation, penetration testing, hunt operations, and breach assessments, plus training and specialized tools. It works by mimicking real attackers to test defenses, actively hunting for threats in networks, and evaluating incident impact, while tools like BloodHound map Active Directory relationships to reveal attack paths and PowerForensics supports disk-forensics. The company differentiates itself with a hands-on, attacker-tactics-driven approach that combines services, training, and proprietary tooling for both government and commercial clients. Its goal is to help organizations strengthen their security posture against advanced cyber threats.

Company Size

201-500

Company Stage

Series B

Total Funding

$108.5M

Headquarters

Alexandria, Virginia

Founded

2017

Simplify Jobs

Simplify's Take

What believers are saying

  • Identity attacks comprise 80% of breaches, boosting BloodHound Scentry demand.
  • $75M Series B in March 2025 funds BloodHound Enterprise scaling led by Insight Partners.
  • Customers achieve 35% risk reduction and block 17,000 attack paths monthly.

What critics are saying

  • CrowdStrike Falcon Identity Protection bundles EDR, eroding BloodHound market share.
  • Microsoft Entra ID Attack Path Analysis commoditizes BloodHound in Azure environments.
  • Okta native Attack Surface Management captures BloodHound Okta extension customers.

What makes SpecterOps unique

  • BloodHound Enterprise maps attack paths across Okta, GitHub, and Mac environments.
  • OpenGraph extensions integrate with Palo Alto Cortex XSOAR and Microsoft Sentinel.
  • BloodHound Scentry accelerates Identity Attack Path Management maturity in six months.

Help us improve and share your feedback! Did you find this helpful?

Benefits

Health Insurance

Dental Insurance

Vision Insurance

Life Insurance

Unlimited Paid Time Off

Flexible Work Hours

Paid Holidays

401(k) Retirement Plan

401(k) Company Match

Stock Options

Home Office Stipend

Phone/Internet Stipend

Professional Development Budget

Family Planning Benefits

Growth & Insights and Company News

Headcount

6 month growth

1%

1 year growth

4%

2 year growth

0%
Business Wire
Mar 18th, 2026
SpecterOps extends BloodHound identity attack path management to Okta, GitHub and Mac

SpecterOps, creator of BloodHound and leader in identity Attack Path Management, has announced new coverage for Okta, GitHub and Mac environments. The enhanced BloodHound Enterprise adds OpenGraph extensions enabling identity and security teams to remediate cross-platform attack paths whilst protecting critical assets like code repositories and customer data. The platform now identifies and prioritises hybrid attack paths across identity providers, applications and repositories, providing remediation guidance to prevent exploitation. New capabilities include privilege zone analysis for least-privilege enforcement, environment-level access controls, bring-your-own-key encryption and integrations with Palo Alto Cortex XSOAR, Microsoft Sentinel and ServiceNow VRM. SpecterOps will demonstrate the new capabilities at RSAC 2026, with a webinar scheduled for 31st March to explore the enhanced features.

Dolphin Publications
Mar 18th, 2026
BloodHound sniffs out attack paths in Okta, GitHub, and Mac environments.

BloodHound sniffs out attack paths in Okta, GitHub, and Mac environments. SpecterOps adds support for Okta, GitHub, and Mac environments to BloodHound Enterprise. With OpenGraph extensions, identity and security teams can manage and remediate attack paths across multiple platforms. New privilege zones and integrations with Palo Alto, Microsoft Sentinel, and ServiceNow are designed to further strengthen the security of hybrid environments. The expansion of BloodHound Enterprise runs on OpenGraph extensions, enabling organizations to better detect and close attack paths that span multiple platforms. SpecterOps will demonstrate the new capabilities next month at RSA Conference 2026. The company positions BloodHound Enterprise as a platform for Identity Attack Path Management (APM). Techzine don't have to guess why they built a security tool for this. "Attackers increasingly exploit identities and the trust relationships between platforms, people, and agents to gain access to critical assets," said Justin Kohler, Chief Product Officer at SpecterOps. OpenGraph connects platforms. With OpenGraph, identity and security teams can extend their attack path management to Okta, GitHub, and Jamf-managed Mac endpoints. This involves detecting misconfigurations in identity settings, privilege escalation paths, and risks of unauthorized access. Privilege Zone Analysis enables the definition of multiple privilege layers and the identification of breaches outside the traditional identity infrastructure. BloodHound Enterprise is therefore not limited to Active Directory. According to the company, customers achieve an average 35 percent risk reduction in the first month of adoption, and addressing a single critical vulnerability blocks an average of more than 17,000 attack paths. This translates into tangible results for security teams managing hybrid environments. In other words: fewer compromises and potentially less severe compromises if attackers do manage to gain entry, thanks to limited lateral movement. New integrations and encryption control. In addition to the platform expansion, SpecterOps is introducing integrations with Palo Alto Cortex XSOAR, Microsoft Sentinel, and ServiceNow VRM. These link attack path findings to existing security workflows. Also new is support for Bring Your Own Key (BYOK), which allows organizations to manage their own encryption keys for internal security requirements and compliance purposes. The platform not only integrates with other systems but also expands its usability in other ways. In January, SpecterOps introduced an on-premises version of BloodHound Enterprise for organizations that manage their critical assets outside the cloud. In March of last year, the company raised $75 million in a Series B round to accelerate the rollout of BloodHound Enterprise. On March 31, SpecterOps is hosting a webinar featuring a live demo of the new OpenGraph extensions.

Business Wire
Feb 10th, 2026
SpecterOps launches BloodHound Scentry to help organisations build identity attack path management practice

SpecterOps has launched BloodHound Scentry, a service combining its BloodHound Enterprise platform with expert practitioners to help organisations accelerate their identity Attack Path Management (APM) practices. The service aims to help companies advance from no APM capability to well-defined maturity in six months. BloodHound Scentry offers attack path remediation guidance, monthly expert analysis of emerging threats, privilege zone design for critical assets, and customised reporting. The launch comes as identity-based attacks rise, with the 2024 Verizon Data Breach Investigations Report finding that around 80% of breaches involve compromised credentials. SpecterOps created the open-source BloodHound tool, which has been downloaded over 1.5 million times. The company provides security services to clients including OpenAI and Palantir.

D2 Emerge LLC
Jul 29th, 2025
Latest BloodHound release enables ingestion of data from third-party system for more comprehensive attack path mapping

The security company SpecterOps has announced the release of the latest version of its open source Attack Path Management tool BloodHound.

Cyber Technology Insights
May 20th, 2025
SpecterOps Adds CFO, CRO, CMO Post-$75 Million Raise to Drive Identity Risk Growth

SpecterOps, the leader in identity risk management and adversary tradecraft, announced the expansion of its executive leadership team with the appointments of Tim Bender as Chief Financial Officer (CFO), Pat Sheridan as Chief Revenue Officer (CRO), and Bryce Hein as Chief Marketing Officer (CMO).

INACTIVE