Cybersecurity Analyst – Operations Watch Analyst (Tier 1–3) jobs in United States
cer-icon
Apply on Employer Site
company-logo

Sentar Inc. · 2 months ago

Cybersecurity Analyst – Operations Watch Analyst (Tier 1–3)

Sentar Inc. is an employee-owned company focused on cybersecurity, intelligence, analytics, and systems engineering. The Cybersecurity Analyst – Operations Watch Analyst is responsible for identifying, investigating, and mitigating cyber incidents while ensuring compliance with DoD directives.

AnalyticsCyber SecurityInformation ServicesInformation TechnologyIntelligent Systems
check
Growth Opportunities
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Identify, investigate, report, and mitigate cyber incidents across diverse network environments
Ensure timely detection, analysis, and response to security events in accordance with Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510.01B and other applicable Department of Defense (DoD) directives
Assess the severity of incidents, document findings, and coordinate appropriate response actions with stakeholders across the DoD Information Network (DoDIN)
Maintain a thorough working knowledge of CJCSM 6510.01B and ensure compliance with related policies and procedures
Develop, maintain, and continuously improve Standard Operating Procedures (SOPs) for operational watch functions
Conduct proactive network intrusion detection, monitoring, correlation, and analysis to identify potential threats
Validate and assess suspicious events to determine if they meet incident criteria, ensuring accurate and timely entry into designated reporting systems
Coordinate with Joint Force Headquarters-DoDIN (JFHQ-DoDIN) and supported organizations to ensure appropriate analysis, reporting, and escalation of significant incidents
Provide 24/7 incident response coverage, including after-hours and surge support as mission needs dictate
Perform network and host-based digital forensics across Microsoft Windows and other operating systems to support incident analysis and remediation
Analyze full packet captures (PCAP) using tools such as Wireshark and other network forensic utilities
Correlate system and network activity using Splunk and other log aggregation tools to detect anomalies and potential intrusions
Develop, tune, and implement Intrusion Detection/Prevention System (IDS/IPS) signatures to enhance detection accuracy and minimize false positives
Participate in program reviews, product assessments, and on-site certification evaluations to strengthen cyber defense posture
Support a rotating shift schedule (4x10-hour workdays), including at least one weekend day
Work collaboratively in a high-tempo, mission-focused environment requiring flexibility and occasional overtime for surge operations

Qualification

CybersecurityIncident responseDigital forensicsIAT Level II certificationIAT Level III certificationPacket analysisSplunkCJCSM 6510.01B knowledgeLog correlationCommunication skillsCritical thinkingTeam collaboration

Required

Secret with upgrade to TS required
Bachelor's degree in Cybersecurity, Information Technology, or a related field; or a minimum of three years of directly relevant experience, preferably within a DoD or federal cybersecurity environment
Willingness to travel up to 15% globally, including short-notice (72-hour) deployments in support of incident response operations
Must hold an IAT Level II (Tier 1 and 2) or IAT Level III (Tier 3) certification (per DoD 8570.01-M) and PWS certification requirements in accordance with DoD cybersecurity workforce requirements

Preferred

Five or more years of cybersecurity incident response experience
Strong knowledge of incident response procedures, packet analysis, IDS/IPS technologies, and host-based security tools
Proficiency in log correlation and analysis using tools such as Splunk, Elastic, or equivalent platforms
Familiarity with digital forensics tools and methodologies
Demonstrated ability to analyze complex issues, think critically, and operate independently under pressure
Excellent written and verbal communication skills to support operational reporting and coordination
In-depth understanding of CJCSM 6510.01B reporting requirements
Prior experience in DoD environments
Experience conducting digital forensics and malware analysis

Benefits

Voluntary Medical, Dental, Vision, with Health Savings or Flexible Spending Plan options
Voluntary Life, Critical Illness, Accident, and Long Term Care insurance options
Group Term Life, Short-Term and Long-Term Disability is provided by Sentar to all qualifying employees
Generous 401(k) match
Competitive PTO plan that graduates quickly with years of service
Other leave programs; holiday schedule along with bereavement, maternity, jury and military duty
Mental health awareness programs
Tuition reimbursement
Professional development reimbursement
Recognition and Awards programs

Company

Sentar Inc.

twittertwitter
company-logo
Sentar, an employee-owned company, is a leading cyber-intelligence solutions provider focused on the National Security sector.

Funding

Current Stage
Growth Stage
Total Funding
unknown
Key Investors
US Department of Energy
2023-08-17Grant
2021-03-11Acquired

Leadership Team

leader-logo
Peter Kiss
CVO/Visionary
linkedin
leader-logo
Stephen Pratt
Chief Information Security Officer (CISO) / Director of Programs, Cyber Risk & Compliance Sector
linkedin
Company data provided by crunchbase