Today
Secret
Early Career (2+ yrs experience)
IT - Security
Overview:
Planned Systems International (PSI) is an Enterprise IT services company who focuses on designing, building, securing, and operating cutting-edge software solutions that drive mission success and operational excellence for Federal Government organizations. We are dedicated to supporting the Air Force’s technological edge by delivering innovative software engineering services that directly support cyber operations, threat defense, and mission assurance. Our goal is to be a trusted mission partner in enabling cyber readiness and resilience across the Air Force and U.S. Cyber Command.
We’re seeking a detail-oriented and proactive Cyber Security Analyst to join our team supporting the U.S. Air Force’s Unified Platform Software Factory in San Antonio. In this role, you’ll support cyber defense activities by analyzing logs and alerts, identifying threats, supporting incident response, and developing security detection content such as alerts and dashboards to enhance continuous monitoring and threat detection. You’ll play a key role in ensuring mission-critical systems remain secure, compliant, and resilient in a dynamic cyber threat landscape.
Essential Functions and Job Responsibilities:
Monitor, triage, and analyze security alerts and logs across mission systems to identify anomalous or malicious activity.
Support incident response activities by conducting initial investigations and escalating issues as needed.
Lead investigations into high-priority security incidents, including malware analysis and reverse engineering to determine intent and impact, and provide root cause analysis and remediation guidance to system teams.
Leverage SIEM platforms and threat intelligence feeds to identify patterns, indicators of compromise (IOCs), and trends.
Perform vulnerability scans, assist with patch tracking, and maintain POA&M documentation.
Collaborate with cyber engineers to implement and refine monitoring, alerting, and defensive toolsets.
Analyze system and network activity for indicators of security policy violations or threats.
Assist in maintaining and updating system security documentation in alignment with RMF and NIST SP 800-53 standards.
Participate in readiness assessments, compliance checks, and audit preparation activities.
Contribute to briefings and reports that communicate risks, vulnerabilities, and mitigation strategies to mission stakeholders.
Minimum Requirements:
Active T3 investigation, with the ability to obtain and maintain necessary security clearances as required for access to classified information.
3–5 years of experience in cybersecurity analysis or security operations, including defending AWS-hosted environments and Internet-facing web services.
Hands-on experience with SIEM platforms, log analysis, and basic incident response techniques.
Experience developing detection content such as alerts, dashboards, and correlation rules to support threat monitoring.
Familiarity with malware analysis and reverse engineering techniques to determine impact and intent.
Linux experience is required, including familiarity with command-line tools and system internals.
Ability to produce root cause analysis reports and remediation guidance following security incidents.
Understanding of common cybersecurity frameworks such as RMF, NIST SP 800-53, and DISA STIGs.
Working knowledge of networking protocols, system logs, and host/network forensics.
Familiarity with tools such as Splunk, Kibana, Elastic, Suricata, OSQuery, or similar.
Exposure to threat intelligence platforms, vulnerability management, or EDR solutions.
Strong written and verbal communication skills with attention to detail.
Security+ or equivalent DoD 8570-compliant certification preferred.
B.S. in Cybersecurity, Information Technology, or equivalent experience.
Planned Systems International (PSI) is an Enterprise IT services company who focuses on designing, building, securing, and operating cutting-edge software solutions that drive mission success and operational excellence for Federal Government organizations. We are dedicated to supporting the Air Force’s technological edge by delivering innovative software engineering services that directly support cyber operations, threat defense, and mission assurance. Our goal is to be a trusted mission partner in enabling cyber readiness and resilience across the Air Force and U.S. Cyber Command.
We’re seeking a detail-oriented and proactive Cyber Security Analyst to join our team supporting the U.S. Air Force’s Unified Platform Software Factory in San Antonio. In this role, you’ll support cyber defense activities by analyzing logs and alerts, identifying threats, supporting incident response, and developing security detection content such as alerts and dashboards to enhance continuous monitoring and threat detection. You’ll play a key role in ensuring mission-critical systems remain secure, compliant, and resilient in a dynamic cyber threat landscape.
Essential Functions and Job Responsibilities:
Monitor, triage, and analyze security alerts and logs across mission systems to identify anomalous or malicious activity.
Support incident response activities by conducting initial investigations and escalating issues as needed.
Lead investigations into high-priority security incidents, including malware analysis and reverse engineering to determine intent and impact, and provide root cause analysis and remediation guidance to system teams.
Leverage SIEM platforms and threat intelligence feeds to identify patterns, indicators of compromise (IOCs), and trends.
Perform vulnerability scans, assist with patch tracking, and maintain POA&M documentation.
Collaborate with cyber engineers to implement and refine monitoring, alerting, and defensive toolsets.
Analyze system and network activity for indicators of security policy violations or threats.
Assist in maintaining and updating system security documentation in alignment with RMF and NIST SP 800-53 standards.
Participate in readiness assessments, compliance checks, and audit preparation activities.
Contribute to briefings and reports that communicate risks, vulnerabilities, and mitigation strategies to mission stakeholders.
Minimum Requirements:
Active T3 investigation, with the ability to obtain and maintain necessary security clearances as required for access to classified information.
3–5 years of experience in cybersecurity analysis or security operations, including defending AWS-hosted environments and Internet-facing web services.
Hands-on experience with SIEM platforms, log analysis, and basic incident response techniques.
Experience developing detection content such as alerts, dashboards, and correlation rules to support threat monitoring.
Familiarity with malware analysis and reverse engineering techniques to determine impact and intent.
Linux experience is required, including familiarity with command-line tools and system internals.
Ability to produce root cause analysis reports and remediation guidance following security incidents.
Understanding of common cybersecurity frameworks such as RMF, NIST SP 800-53, and DISA STIGs.
Working knowledge of networking protocols, system logs, and host/network forensics.
Familiarity with tools such as Splunk, Kibana, Elastic, Suricata, OSQuery, or similar.
Exposure to threat intelligence platforms, vulnerability management, or EDR solutions.
Strong written and verbal communication skills with attention to detail.
Security+ or equivalent DoD 8570-compliant certification preferred.
B.S. in Cybersecurity, Information Technology, or equivalent experience.
group id: RTL413949