Operations Watch Analyst

Core4ce

Today
Secret
Unspecified
Unspecified
Pearl City, HI (On-Site/Office)

The Operations Watch Analyst is responsible for monitoring, analyzing, and responding to security incidents across various data sources and environments. This role involves validating and categorizing incidents, ensuring they are accurately reported according to the Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510.01B, and implementing appropriate response measures.

Responsibilities
  • Maintain and understand the directives of CJCSM 6510.01B.
  • Develop and manage internal standard operating procedures (SOPs) related to cybersecurity operations.
  • Ensure documentation and cybersecurity measures comply with CJCSM 6510.01B and other related policies.
  • Conduct network intrusion detection, monitor systems, and perform correlation analysis to support the Cybersecurity Service Provider (CSSP) and its clients.
  • Analyze suspicious events to confirm security incidents and document them in required systems.
  • Coordinate with Joint Force Headquarters DoD Information Network (JFHQ-DoDIN) and other entities to ensure thorough incident analysis and reporting.
  • Provide round-the-clock support for incident responses as required by CSSP, including outside of core business hours.
  • Conduct digital forensics on network and host systems, particularly Microsoft Windows, to support significant incident investigations.
  • Utilize tools such as Wireshark for full packet capture analysis and employ log correlation techniques using Splunk and other tools.
  • Engage in signature development for IDS/IPS solutions and participate in security evaluations and certifications.


Requirements
  • U.S. citizenship.
  • Secret Clearance; must be eligible for TS/SCI
  • Bachelor's degree in a relevant field or three years of relevant experience, preferably in a DoD setting.
  • Willingness to travel up to 15% internationally; emergency travel may be required on 72-hour notice.
  • Must possess IAT Level II and CSSP Compliant Certifications.


Preferred
  • Over three years of experience in incident response.
  • Independent problem-solving skills.
  • Comprehensive knowledge of incident response procedures and packet analysis.
  • Proficiency in IDS/IPS, host-based tools, and log aggregation technologies.
  • Strong analytical abilities and effective communication skills.


Additional Information:
  • Due to operational needs, candidates should be flexible regarding shift assignments as they are subject to change based on organizational requirements.
  • Work shifts include four ten-hour days weekly, which may include weekends (e.g., Wednesday to Saturday or Sunday to Wednesday).


All qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy), national origin, disability, veteran status, age, genetic information, or other legally protected status.
group id: 10488887
N
Name HiddenRecruiter
Find Core4ce on Social Media
Network Employers (6)
J
Recruiter
S
Senior Program Strategy Analyst
D
Senior Talent Acquisition Specialist
J
Associate Vice President, Talent Acquisition
A
Recruiter
About Us
Core4ce is a cybersecurity company that serves as a trusted partner to the national security community. We specialize in building, modernizing, and defending our nation’s digital infrastructure. We assemble highly experienced teams who counter global threats and design resilient networks, systems, and applications. We earn the respect of our partners by boldly investing in innovation and delivering on our commitments. By honing our expertise across four core disciplines – cyber operations, digital modernization, engineering, and analysis –we're developing solutions and delivering lasting mission advantage for our customers.

Core4ce Jobs


Clearance Level
Secret
Employer
Core4ce