Today
Top Secret
Early Career (2+ yrs experience)
Unspecified
IT - Networking
Charleston, SC (On/Off-Site)
We are seeking a Level II Cybersecurity DCO SOC Analyst to support enterprise-level Defensive Cyber Operations (DCO). The ideal candidate will bring hands-on experience in threat detection, log analysis, SIEM tuning, incident triage, and escalation within a 24/7 Security Operations Center (SOC) environment. This position requires an analytical, mission-focused cybersecurity professional who can correlate data across multiple sensors, validate indicators of compromise (IOCs), and provide actionable recommendations to senior analysts and leadership.
Responsibilities
• Conduct continuous monitoring of enterprise networks to detect, analyze, and respond to cybersecurity events.
• Perform log analysis, network traffic inspection, and endpoint event correlation to identify malicious behavior.
• Tune and maintain SIEM and security monitoring tools for enhanced detection accuracy.
• Investigate alerts, validate incidents, and escalate per defined SOC playbooks.
• Identify and track threat actor TTPs, malware indicators, and IOCs.
• Document findings and provide comprehensive incident reports and recommendations.
• Support incident response, vulnerability management, and continuous SOC process improvements.
• Collaborate with cross-functional cyber defense teams to strengthen enterprise security posture.
Required Skills & Experience
• Strong understanding of enterprise-level defensive cyber operations and DoD cyber defense frameworks.
• Experience with IDS/IPS, EDR packet analysis, and log aggregation platforms.
• Working knowledge of network protocols, forensics, and malware analysis.
• Familiarity with MITRE ATT&CK, vulnerability management, and incident response workflows.
• Excellent analytical, communication, and documentation skills.
• Ability to operate in a high-tempo, 24/7 SOC environment.
Certification Requirements:
Must hold one or more DoD 8570 IAT Level II or III baseline certifications, such as:
IAT II/III: CCNA Security, CySA+, GICSP, GSEC, Security+ CE, SSCP, CASP+, CCNP Security, CISA, CISSP, GCED, GCIH
Preferred Qualifications:
Previous experience in a DoD, government, or defense contractor cyber environment.
Knowledge of RMF, NIST 800-53, STIGs, and other compliance frameworks.
Scripting or automation experience (Python, PowerShell, Bash).
Responsibilities
• Conduct continuous monitoring of enterprise networks to detect, analyze, and respond to cybersecurity events.
• Perform log analysis, network traffic inspection, and endpoint event correlation to identify malicious behavior.
• Tune and maintain SIEM and security monitoring tools for enhanced detection accuracy.
• Investigate alerts, validate incidents, and escalate per defined SOC playbooks.
• Identify and track threat actor TTPs, malware indicators, and IOCs.
• Document findings and provide comprehensive incident reports and recommendations.
• Support incident response, vulnerability management, and continuous SOC process improvements.
• Collaborate with cross-functional cyber defense teams to strengthen enterprise security posture.
Required Skills & Experience
• Strong understanding of enterprise-level defensive cyber operations and DoD cyber defense frameworks.
• Experience with IDS/IPS, EDR packet analysis, and log aggregation platforms.
• Working knowledge of network protocols, forensics, and malware analysis.
• Familiarity with MITRE ATT&CK, vulnerability management, and incident response workflows.
• Excellent analytical, communication, and documentation skills.
• Ability to operate in a high-tempo, 24/7 SOC environment.
Certification Requirements:
Must hold one or more DoD 8570 IAT Level II or III baseline certifications, such as:
IAT II/III: CCNA Security, CySA+, GICSP, GSEC, Security+ CE, SSCP, CASP+, CCNP Security, CISA, CISSP, GCED, GCIH
Preferred Qualifications:
Previous experience in a DoD, government, or defense contractor cyber environment.
Knowledge of RMF, NIST 800-53, STIGs, and other compliance frameworks.
Scripting or automation experience (Python, PowerShell, Bash).
group id: 91092480