VSE Aviation · 1 day ago
IT Security Analyst
VSE Aviation is seeking an IT Security Analyst II to join their cybersecurity defense team, responsible for proactive threat detection and incident response. This role involves managing security alerts, improving incident response procedures, and collaborating with various teams to enhance VSE's security posture.
AerospaceIndustrialManufacturing
Responsibilities
Own the triage and investigation of all security alerts and incidents in alignment with VSE’s Incident Response (IR) framework, serving as the primary responder and escalation point in coordination with VSE’s managed SOC partner
Perform advanced analysis of security alerts from multiple sources to identify true positives, detect emerging threats, and recommend containment and remediation strategies
Serve as the primary point of contact for escalated incidents from Tier I analysts and managed SOC partners
Own and continuously improve the incident response playbooks, ensuring procedures evolve with threat intelligence and adversarial trends
Develop and implement SIEM use cases, correlation rules, and dashboards to improve detection accuracy and operational efficiency
Manage and maintain endpoint, email, and cloud security platforms — ensuring configurations, policies, and rules are optimized for evolving threats
Conduct phishing simulations and user behavior analysis; lead targeted awareness campaigns for high-risk groups
Perform root cause analysis for recurring incidents and propose technical or procedural remediation plans
Collaborate closely with Network, Infrastructure, and Cloud teams to harden environments and ensure consistent enforcement of security controls
Support security audits, penetration testing activities, and red/blue/purple team exercises — driving follow-up actions to closure
Generate metrics, reports, and trend analysis to inform leadership and support continuous improvement initiatives
Act as the technical lead for specific security domains (e.g., SOAR/SIEM operations, incident response)
Guide team members in threat analysis and incident handling
Contribute to policy and process development, ensuring alignment with regulatory frameworks and industry best practices
Lead post-incident reviews and lessons-learned sessions to improve detection and response maturity
Other duties as assigned
Qualification
Required
Experience in incident response and security alert triage
Proficiency in analyzing security alerts from multiple sources
Ability to develop and implement SIEM use cases and correlation rules
Experience managing endpoint, email, and cloud security platforms
Knowledge of phishing simulations and user behavior analysis
Experience in conducting root cause analysis for security incidents
Ability to collaborate with Network, Infrastructure, and Cloud teams
Experience supporting security audits and penetration testing activities
Ability to generate metrics, reports, and trend analysis
Experience in leading post-incident reviews and lessons-learned sessions
Preferred
Experience with SOAR/SIEM operations
Knowledge of regulatory frameworks and industry best practices
Experience in developing incident response playbooks