General Dynamics Information Technology · 12 hours ago
SOC Tier 3 Analyst
General Dynamics Information Technology is seeking a highly-capable SOC Tier 3 Analyst to lead advanced threat detection and response operations in their Security Operations Center. This role involves acting as a key subject matter expert to identify, investigate, and mitigate sophisticated cyber threats while ensuring enterprise security resilience.
Artificial Intelligence (AI)Cloud ComputingConsultingCyber SecurityInformation Technology
Responsibilities
Serve as the senior analyst and escalation point for Tier 1 & Tier 2 in security incident handling
Perform advanced threat hunting and forensic investigations (network, endpoint, cloud)
Lead incident response activities, including coordination, containment, eradication, and long-term remediation
Develop and refine SIEM detection rules and automation playbooks to improve SOC efficacy
Analyze and interpret logs, packet captures, and alerts to identify anomalous activities
Provide actionable threat intelligence to enhance defenses and support strategic decisions
Drive process improvement, mentoring, and training initiatives for the SOC team
Ensure compliance with client requirements, regulations, and relevant cybersecurity frameworks (e.g., NIST, CIS)
Interface with stakeholders to provide threat landscape briefings, status reports, and post-incident reviews
Participate in red/blue teaming and tabletop exercises to validate SOC preparedness
Qualification
Required
Technical Training, Certification(s), or Degree required; bachelor's degree in Cybersecurity, Information Technology, or a related field (or equivalent experience) strongly preferred
At least 5 years of combined experience in cybersecurity incident handling, SOC operations, and threat intelligence analysis
US Citizenship required
Must possess or be able to obtain and maintain a Secret clearance
Relevant industry certifications [e.g., CISSP, Security+, GIAC-GCIH, CEH, GCIA, GCFA, OSCP]
Expertise with security technologies, including SIEM systems (e.g., Splunk, QRadar, ArcSight), network monitoring tools, and endpoint detection solutions
Proficiency in scripting and automation using Python, PowerShell, or other languages
Hands-on experience performing forensic analysis on Windows, Linux, and cloud environments
Strong knowledge of security protocols, intrusion vectors, malware behavior, and remediation techniques
Exceptional problem-solving and communication skills with the ability to handle high-pressure situations
Preferred
Degree and/or advanced certifications in cybersecurity
Experience integrating threat intelligence in SIEM and SOC processes
Knowledge of MITRE ATT&CK framework and its application in SOC workflows
Familiarity with cloud security (e.g., AWS, Azure, Google Cloud)
Benefits
Comprehensive benefits and wellness packages
401K with company match
Paid time off
Variety of medical plan options
Some with Health Savings Accounts
Dental plan options
Vision plan
Paid parental leave
Military leave
Bereavement leave
Jury duty leave
Short and long-term disability benefits
Life insurance
Accidental death and dismemberment insurance
Personal accident insurance
Critical illness insurance
Business travel and accident insurance
Company
General Dynamics Information Technology
General Dynamics Information Technology is an IT consulting company that specializes in cyber security, AI, and quantum computing. It is a sub-organization of General Dynamics.
Funding
Current Stage
Late StageRecent News
Company data provided by crunchbase