SITEC - Cybersecurity Analyst (JNY) - Ft. Bragg

PeratonFort Bragg, NC
5d$66,000 - $106,000Onsite

About The Position

Peraton requires Cybersecurity Analysts to support the Special Operation Command Information Technology Enterprise Contract (SITEC) – 3 EOM.  This position is located at Ft. Bragg. The purpose of the Special Operations Forces Information Technology Enterprise Contract (SITEC) 3 Enterprise Operations and Maintenance (EOM) Task Order (TO) is to provide USSOCOM, its Component Commands, its Theater Special Operations Commands (TSOCs), and its deployed forces with Operations and Maintenance (O&M) services to maintain Network Operations (NetOps); maintain systems and network infrastructure; provide end user and common device support; provide configuration, change, license, and asset management; conduct training, and perform Install, Move, Add, Change (IMACs) services. The responsibilities and tasks associated with each requirement play a pivotal role to USSOCOM, the CIO/J6 organization, and ultimately the end-user who operate around the globe 24x7x365. This position offers an opportunity for experienced cybersecurity professionals to take on advanced responsibilities in defending USSOCOM’s global operations. The Journeyman Cyber Security Analyst will play a pivotal role in enhancing SOC capabilities, mentoring junior team members, and ensuring the security and resilience of systems critical to USSOCOM’s mission success. Expertise in identifying and analyzing sophisticated threats using SIEM platforms, intrusion detection systems (IDS), and other advanced tools. Strategic ability to correlate data from multiple sources to uncover advanced persistent threats (APTs) and complex attack patterns. Proficiency in refining detection rules and alerts to enhance threat identification capabilities. Leadership in managing high-priority security incidents, including coordinating containment, eradication, and recovery strategies. Advanced skills in root cause analysis and delivering actionable recommendations for future mitigation. Ability to create detailed post-incident reports to inform organizational strategy and resilience. Ability to lead audits and assessments, providing recommendations to enhance compliance and streamline processes. Advanced skills in securing NetOps and systems/network infrastructure against evolving threats. Leadership in mentoring junior analysts, fostering their growth and technical expertise. Strategic collaboration with SOC team members, IT staff, and stakeholders to develop coordinated threat responses. Ability to contribute to cross-functional discussions and drive improvements in SOC operations. Continuous Improvement and Research: Commitment to staying informed on emerging threats, technologies, and best practices to enhance SOC capabilities. Strategic mindset to research and recommend tools, techniques, and strategies for improved operations. Ability to deliver training sessions to elevate team knowledge and preparedness. Operate within a 24/7 SOC environment, which may require shift work, including nights, weekends, and holidays. Handle sensitive and classified information in compliance with DoD and USSOCOM requirements.

Requirements

  • Min 6 years with HS Diploma, 4 years AS/AA degree, 2 years with BS/BA degree
  • A DoD TS/SCI clearance is required
  • DoD 8570 IAT II certifications AND CEH OR CFR OR CCNA Cyber Ops OR CCNA-Security OR CySA+ OR CHFI OR GCIA OR GCIH OR GCFA OR GICSP OR Cloud + OR SCYBER OR PenTest +
  • Strong understanding of cybersecurity concepts, including threat detection, malware analysis, and network security
  • Proficiency with one or more tools such as SIEM platforms, IDS/IPS, endpoint protection solutions, and forensic analysis tools
  • Advanced analytical and problem-solving skills with the ability to handle complex incidents and scenarios
  • Effective communication skills, including the ability to create detailed reports and brief stakeholders
  • Ability to work independently and lead initiatives in a fast-paced, team-oriented environment
  • Candidate must be willing to work the following work schedule: This position has a 12 hour rotating shift work schedule totaling 80 hours for the two-week pay period. Weekly Schedule is Sunday-Wednesday or Wednesday-Saturday and is composed of 3x12 hour shifts or 3x12 hour shifts and 1x 8 hour shift. Work hours may flex or change to meet mission requirements, most likely on a 3 month rotation.

Nice To Haves

  • Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or a related field (or equivalent experience)
  • Advanced certifications such as CISSP, GIAC (e.g., GCIA, GCIH), or OSCP
  • Experience with scripting or automation tools (e.g., Python, PowerShell) and threat hunting techniques
  • Knowledge of advanced threat intelligence platforms and methodologies

Responsibilities

  • Enhancing SOC capabilities
  • Mentoring junior team members
  • Ensuring the security and resilience of systems critical to USSOCOM’s mission success
  • Identifying and analyzing sophisticated threats using SIEM platforms, intrusion detection systems (IDS), and other advanced tools
  • Correlating data from multiple sources to uncover advanced persistent threats (APTs) and complex attack patterns
  • Refining detection rules and alerts to enhance threat identification capabilities
  • Managing high-priority security incidents, including coordinating containment, eradication, and recovery strategies
  • Root cause analysis and delivering actionable recommendations for future mitigation
  • Creating detailed post-incident reports to inform organizational strategy and resilience
  • Leading audits and assessments, providing recommendations to enhance compliance and streamline processes
  • Securing NetOps and systems/network infrastructure against evolving threats
  • Mentoring junior analysts, fostering their growth and technical expertise
  • Strategic collaboration with SOC team members, IT staff, and stakeholders to develop coordinated threat responses
  • Contributing to cross-functional discussions and drive improvements in SOC operations
  • Staying informed on emerging threats, technologies, and best practices to enhance SOC capabilities
  • Researching and recommending tools, techniques, and strategies for improved operations
  • Delivering training sessions to elevate team knowledge and preparedness
  • Operating within a 24/7 SOC environment, which may require shift work, including nights, weekends, and holidays
  • Handling sensitive and classified information in compliance with DoD and USSOCOM requirements

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

High school or GED

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service