DCO Watch Analyst Tier 3 CHS jobs in United States
cer-icon
Apply on Employer Site
company-logo

Adapt Forward · 1 month ago

DCO Watch Analyst Tier 3 CHS

Adapt Forward is a cybersecurity solutions provider for some of the nation’s most valuable information systems. As a Tier 3 Defensive Cyber Operations (DCO) Watch Analyst, you will lead complex incident response efforts, conduct proactive threat hunting, and enhance detection capabilities within a Cybersecurity Service Provider environment.

ComputerCyber SecurityNetwork Security
check
Comp. & Benefits
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Analyze and understand the behavior of malware using dynamic and static reverse engineering techniques
Produce comprehensive technical reports documenting malware capabilities, mitigation strategies, and recommended defensive actions
Develop and maintain YARA signatures to identify malware families and variants across enterprise environments at scale
Lead incident response efforts, including analysis, mitigation, and reporting of significant incidents per CJCSM 6510.01B
Manage incident response campaigns by developing strategies, coordinating multi-team efforts, and ensuring comprehensive resolution and reporting
Conduct proactive threat hunting to identify advanced threats and vulnerabilities within the network
Lead purple team exercises to evaluate and enhance detection and response capabilities in collaboration with red and blue teams
Evaluate and refine detection mechanisms, including IDS/IPS signatures and log correlation rules, to improve accuracy and reduce false positives
Perform advanced network and host-based digital forensics on Windows and other operating systems to support incident investigations
Coordinate with reporting agencies and subscriber sites to ensure comprehensive analysis and reporting of significant incidents
Develop and maintain internal SOP documentation, ensuring alignment with CJCSM 6510.01B and other directives
Provide 24/7 support for incident response during non-core hours, and mentor junior analysts
Lead program reviews, product evaluations, and onsite certification evaluations
Overtime may be required to support incident response actions (Surge)
Operations are conducted 24/7/365 across three regional operation centers (ROC)
Each ROC works four ten-hour shifts (Sunday-Wednesday or Wednesday-Saturday)
Shift placement is at the discretion of assigned managers

Qualification

Malware AnalysisIncident ResponseThreat HuntingDigital ForensicsYARA SignaturesCJCSM 6510.01BIDS/IPS SolutionsLog Aggregation ToolsC/C++Assembly LanguageGolangRustCommunication SkillsProblem Solving

Required

Bachelor's Degree in relevant discipline and 5 years or at least 8 years of experience working in a CSSP, SOC, or similar environment
2+ years of experience as a Malware Analyst
Must be a U.S. Citizen
Must have requisite certifications to fulfill DoD 8570 IAT Level II and CSSP-specific requirements

Preferred

Possess comprehensive knowledge of programming skills: including C/C++, Assembly language, Windows APIs, Golang, Rust, exploit development, and related disciplines
Extensive knowledge in the use of decompilers, debuggers and other standard malware analysis tools
Proficiency with kernel and user-mode debugging techniques
Deep knowledge of obfuscation, anti-analysis, and detection evasion methods
Comprehensive knowledge of CJCSM 6510.01B
Deep expertise in IDS/IPS solutions, including signature development and optimization
Extensive experience with Digital Forensics across multiple operating systems
Demonstrated expert-level knowledge of Incident Response Procedures
Advanced proficiency with host-based tools and operating system logging
Expertise in log aggregation tools (e.g., Splunk, Elastic, Sentinel) for complex correlation analysis
Exceptional logical thinking and analytical ability
Superior verbal and written communication skills
Proven ability to solve complex problems independently

Benefits

Comprehensive Physical Wellness Package, including Medical, Dental, Vision Care, plus Flexible Spending Accounts for health- and dependent-care are included in our standard benefits plan.
401k Retirement Plan with Matching Contribution is immediately available and vested.
Annual Training Budget to be used for conference attendance, school enrollment, certification programs, and associated travel expenses.
Eleven Federal Holidays, plus three weeks of PTO/vacation/sick leave that accrues at a rate of ten hours per month.
Employee Assistance Program: Counseling/legal assistance and other employee well-being programs are also offered.

Company

Adapt Forward

twittertwittertwitter
company-logo
Adapt Forward is a cyber security company that specializes in defensive and offensive cyber capabilities.

Funding

Current Stage
Growth Stage

Leadership Team

leader-logo
Rich Bowman
President and CEO
linkedin
Company data provided by crunchbase