Enterprise Security Operations Center (Esoc) Analyst Manager 2

Ingalls ShipbuildingNewport News, VA
Hybrid

About The Position

The eSOC Analyst Manager leads and matures the company’s enterprise-wide Security Operations Center (SOC), providing centralized monitoring, detection, and incident response across the enterprise and its three divisional networks — including one that contains U-NNPI data regulated under NAVSEA 08 controls. The position oversees cybersecurity operations for on-premises and hybrid cloud environments (including O365, Azure, and AWS ) and ensures continuous (24x7x365) coverage and protection of corporate and U.S. Government information. This role requires balancing technical depth, operational leadership, and compliance rigor under DFARS 252.204-7012 , CMMC 2.0 , and NIST SP 800-171/800-53 frameworks. The eSOC Analyst Manager will direct day-to-day security operations, coordinate enterprise incident response, manage SOC personnel and contractors, and continuously evolve monitoring capabilities using automation, threat intelligence, and Zero Trust-aligned practices. The position reports to the SOC Manager and partners with the Cybersecurity Support Group (CSG) manager

Requirements

  • Bachelor's Degree and 6 years of progressive technical experience in research, engineering and design; Master’s Degree and 4 years of relevant experience
  • One of the following may be used as an equivalent to Bachelor's Degree for Information Technology Related Positions Only: NNS Apprentice School graduate Navy Nuclear Power School (NNPS) graduate Associate's Degree or other formal 2 year program and 2 years of relevant exempt experience or 4 years of relevant non-exempt experience Military Paygrade E-5 or above military experience High School/GED and 4 years combined of Manufacturing, Shipbuilding, Trades, Military experience or other relevant exempt experience High School/GED and 8 years combined of Manufacturing, Shipbuilding, Trades, Military experience or other relevant non-exempt experience
  • A relevant professional certification can be substituted for a Bachelor's Degree.

Nice To Haves

  • Bachelor’s degree in Computer Science, Information Assurance, or Cybersecurity (Master’s preferred).
  • Certifications such as CISSP, CISM, GCIA, GCIH, GCED, or equivalent.
  • Experience supporting multiple divisions or business units in a defense industrial base environment.
  • Knowledge of U-NNPI handling and related NAVSEA 08 guidance.
  • Familiarity with cloud-native security monitoring and global IR coordination.
  • 6+ years of progressive experience in cybersecurity, with at least 2 years managing SOC or incident response operations.
  • Demonstrated success leading 24x7 operational teams and managing incident lifecycle activities.
  • Strong knowledge of SIEM, SOAR, EDR/XDR, network IDS/IPS, DLP, and forensic tools.
  • Proven experience operating under DFARS 252.204-7012, CMMC 2.0, and NIST 800-171, and NIST 800-53 requirements.
  • Ability to translate technical issues into business and risk-based terms for executives.

Responsibilities

  • Lead the eSOC’s 24x7x365 analysts, shift leads, and threat intelligence efforts in investigations.
  • Maintain monitoring and response coverage for enterprise, divisional, and cloud networks.
  • Coordinate enterprise-level incident response (IR) activities, ensuring consistent escalation, containment, and recovery across business units.
  • Conduct post-incident reviews and after-action reporting to identify process, technology, or communication improvements.
  • Maintain and refine SOC standard operating procedures (SOPs), playbooks, and communication protocols.
  • Ensure SOC operations comply with DFARS 252.204-7012 , CMMC 2.0 , NIST 800-171 , and relevant DoD contractual cybersecurity clauses .
  • Oversee monitoring and response capabilities for networks that process Controlled Unclassified Information (CUI) and Unclassed Naval Nuclear Propulsion Information (U-NNPI) data.
  • Maintain evidence, logs, and incident documentation suitable for DoD assessments and C3PAO reviews .
  • Coordinate with compliance teams to ensure the SOC’s technology stack and workflows meet evolving regulatory requirements.
  • Execute the eSOC framework as set forth by the eSOC Manager.
  • Manage Key Performance Indicators (KPIs) and Key Risk Indicators (KRIs) , including mean time to detect (MTTD), mean time to respond (MTTR), dwell time, and false positive ratios.
  • Drive automation and orchestration initiatives through SOAR and other technologies to optimize analyst efficiency.
  • Collaborate with CSG to enhance and tune SIEM , EDR/XDR , UEBA , and DLP solutions.
  • Oversee detection content creation, correlation rules, and log source integration across cloud and on-premises systems.
  • Integrate threat intelligence (CTI) feeds and indicators into SOC workflows.
  • Map threats and adversary techniques using the MITRE ATT&CK framework.
  • Partner with internal and external entities (e.g., DIB ISAC, government reporting channels, vendors) for timely intelligence sharing.
  • Track emerging threats relevant to defense contractors and provide actionable insights to leadership.
  • Coordinate hunting efforts and ensure due diligence of investigative efforts

Benefits

  • medical, prescription drug, dental and vision plan choices
  • on-site health centers
  • tele-medicine
  • wellness resources
  • employee assistance programs
  • savings plan options (401K)
  • financial education and planning tools
  • life insurance
  • tuition reimbursement
  • employee discounts
  • early childhood and post-secondary education scholarships
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service