Posted today
Top Secret/SCI
$120,000 - $180,000
Polygraph
IT - Security
Fort Meade, MD (On-Site/Office)
Zachary Piper Solutions is seeking Cyber Operations Analysts to support the Department of Defense's ongoing mission for the DoD Information Network (DODIN) at Ft. Meade, MD. The customer is seeking individuals with expertise with incident handling, network analysis, triage of events, and threat detection to support a critical 24x7 operations center.
Clearance: TS/SCI required
Location: Ft. Meade, MD
Shifts:
Team 1 - 0500 - 1500/Monday - Thursday
Team 2 - 1300 - 2300/Monday - Thursday
Team 3 - 2100 - 0700/Monday - Thursday
Team 4 - 0420 - 1730/Friday - Sunday
Team 5 - 1620 - 0530/Friday - Sunday
This job opens for applications on 3/6/2026. Applications for this job will be accepted for at least 30 days from the posting date
Responsibilities of the Cyber Ops Analyst:
Qualifications of the Cyber Ops Analyst include:
Compensation of the Cyber Ops Analyst include:
#LI-MK1 #LI-Onsite
Keywords: Threat detection, incident response, security event analysis, SIEM monitoring, log correlation, threat hunting, alert triage, intrusion detection, anomaly detection, Splunk, QRadar, ArcSight, Elastic Stack, Splunk, IDS, TCP, IP, TS/SCI, Top secret, polygraph, Federal, government, DoD, clearance, W2, hiring, opentowork, Maryland, PCAP, Wireshark, vulnerability, ACAS, briefing, Wireshark, SOC, security operations center, Sentinel, dashboard creation, log parsing, security automation, playbook execution, SOAR integration, network forensics, endpoint monitoring, malware analysis, vulnerability scanning, vulnerability assessment, Nessus, Tenable.sc, Qualys, Rapid7 InsightVM, risk scoring, patch validation, CVE analysis, CVSS evaluation, vulnerability prioritization, threat intelligence integration, MITRE ATT&CK mapping, IOC enrichment, packet analysis, firewall log review, IDS/IPS tuning, endpoint detection and response (EDR), compliance monitoring, IAVA tracking, DoDIN visibility, configuration baseline review, security hardening, remediation coordination, security reporting, adversary behavior analysis
Clearance: TS/SCI required
Location: Ft. Meade, MD
Shifts:
Team 1 - 0500 - 1500/Monday - Thursday
Team 2 - 1300 - 2300/Monday - Thursday
Team 3 - 2100 - 0700/Monday - Thursday
Team 4 - 0420 - 1730/Friday - Sunday
Team 5 - 1620 - 0530/Friday - Sunday
This job opens for applications on 3/6/2026. Applications for this job will be accepted for at least 30 days from the posting date
Responsibilities of the Cyber Ops Analyst:
- Coordinate Computer Network Defense (CND) efforts across DoD Component Commands, Services, Agencies, and Field Activities (CC/S/A/FA), and track and report how DCO-IDM operations affect their missions.
- Provide the Intelligence Community (IC) with priority intelligence requirements (PIRs) and indications-and-warning needs related to potential threats targeting DoD information systems and networks.
- Centrally manage and/or recommend CND operations that influence more than one DoD Component.
- Deliver Defense-wide situational awareness and attack sensing and warning by integrating, analyzing, and synchronizing information flows.
- De-conflict Vulnerability Analysis and Assessments (VAA) and Red Team operations with ongoing CND activities, and advise on adjustments to current or planned VAAs that could adversely impact CND missions.
- Monitor the DoDIN for Information Assurance Vulnerability Alert (IAVA) compliance and evaluate its implications on overall network defense.
- Develop a unified curriculum for CND education, training, awareness, and professional development, and ensure its application throughout the CNDS certification and accreditation processes.
- Ensure that all Computer Network Defense Service (CNDS) providers maintain continuous information sharing and operate in a coordinated manner-executing a shared Course of Action (COA) with the ability to transition to a new COA as directed. CNDS provider coordination is primarily conducted through CNDS Certification Authorities (CNDS/CAs) under USCYBERCOM direction.
- Recommend changes to Information Operations Conditions (INFOCON) in response to unauthorized activities-such as network attacks, exploitation, or misuse-to reduce risk and limit potential damage to DoD systems and networks.
- Maintain expert knowledge of DoD Computer Network Defense, including understanding network threat lifecycles, attack vectors, and methods of exploiting vulnerabilities.
Qualifications of the Cyber Ops Analyst include:
- Bachelors degree in related discipline and 4+ years of professional IT and cyber security experience
- Experience utilizing network monitoring/SIEM tools: ArcSight, CSAAC, Splunk, PCAP
- Experience working with CNDS providers or working in a CNDSP
- Technical understanding of network communication using TCP/IP protocols, system administration, malware, Computer Network Defense Operations (Proxy, Firewall, IDS/IPS), Joint Operational Planning
- Experience supporting security operations center, providing and briefing senior leaders on threats and mitigation strategies
Compensation of the Cyber Ops Analyst include:
- Total compensation based on experience level - $120,000-$180,000+ **based on experience level**
- Full Benefits: PTO/Holidays, Cigna Medical, Dental, and Vision, 401k with ADP
- Certification reimbursement
- Contract stability funded through 2030
#LI-MK1 #LI-Onsite
Keywords: Threat detection, incident response, security event analysis, SIEM monitoring, log correlation, threat hunting, alert triage, intrusion detection, anomaly detection, Splunk, QRadar, ArcSight, Elastic Stack, Splunk, IDS, TCP, IP, TS/SCI, Top secret, polygraph, Federal, government, DoD, clearance, W2, hiring, opentowork, Maryland, PCAP, Wireshark, vulnerability, ACAS, briefing, Wireshark, SOC, security operations center, Sentinel, dashboard creation, log parsing, security automation, playbook execution, SOAR integration, network forensics, endpoint monitoring, malware analysis, vulnerability scanning, vulnerability assessment, Nessus, Tenable.sc, Qualys, Rapid7 InsightVM, risk scoring, patch validation, CVE analysis, CVSS evaluation, vulnerability prioritization, threat intelligence integration, MITRE ATT&CK mapping, IOC enrichment, packet analysis, firewall log review, IDS/IPS tuning, endpoint detection and response (EDR), compliance monitoring, IAVA tracking, DoDIN visibility, configuration baseline review, security hardening, remediation coordination, security reporting, adversary behavior analysis
group id: 10430981
N