Cybersecurity SOC Analyst jobs in United States
cer-icon
Apply on Employer Site
company-logo

General Dynamics · 21 hours ago

Cybersecurity SOC Analyst

General Dynamics Mission Systems (GDMS) is seeking a Cybersecurity SOC Analyst with expertise in Splunk Enterprise Security and a strong background in threat detection and incident response. The role involves monitoring, analyzing, and responding to security events across GDMS’s enterprise and cloud environments, as well as collaborating with teams to enhance security posture.

AerospaceNational SecurityPublic Transportation
badNo H1BnoteU.S. Citizen Onlynote

Responsibilities

Develop and optimize Splunk SPL queries, dashboards, and correlation searches within Splunk Enterprise Security (ES)
Maintain and enhance Splunk content for detection and reporting
Analyze logs from multiple sources, including Windows Event Logs, Linux system logs, CrowdStrike telemetry, firewall logs, and network traffic
Investigate alerts to identify potential security incidents and anomalous behavior
Conduct proactive threat hunting to detect advanced persistent threats (APTs), insider threats, and suspicious activity across enterprise networks
Incorporate findings into detection content and response playbooks
Monitor and analyze DLP alerts for data exfiltration, data tagging, and compliance violations
Collaborate with teams to remediate and prevent data leakage incidents
Execute IR processes including detection, analysis, containment, eradication, and recovery
Document and track incidents using SOC workflows and ticketing systems
Monitor and assess security controls in AWS and Azure environments
Identify and remediate cloud-specific threats and misconfigurations
Support email security operations, including anti-phishing, anti-spam, malware detection, and incident response for email-based attacks
Stay current with emerging threats, vulnerabilities, and security technologies
Develop automation workflows and scripts to enhance SOC efficiency

Qualification

Splunk Enterprise SecurityThreat detectionIncident responseCloud securitySplunk SPLLog analysisThreat huntingDLP solutionsAWS securityAzure securityAutomation workflowsCommunication skillsCollaboration

Required

Bachelor's degree in a related specialized area or equivalent is required plus a minimum of 2 years of relevant experience; or Master's degree plus a minimum of 0 years of relevant experience
Due to the nature of work performed within our facilities, U.S. citizenship is required
Advanced expertise in Splunk Enterprise Security (ES)
Strong background in threat detection, incident response, and cloud security
Hands-on experience with Splunk SPL, dashboard creation, and correlation searches
Proficiency in analyzing logs from diverse sources
Conducting threat hunts and improving detection capabilities
Collaboration with cross-functional teams to mitigate risks and respond to incidents
Develop and optimize Splunk SPL queries, dashboards, and correlation searches within Splunk Enterprise Security (ES)
Maintain and enhance Splunk content for detection and reporting
Analyze logs from multiple sources, including Windows Event Logs, Linux system logs, CrowdStrike telemetry, firewall logs, and network traffic
Investigate alerts to identify potential security incidents and anomalous behavior
Conduct proactive threat hunting to detect advanced persistent threats (APTs), insider threats, and suspicious activity across enterprise networks
Incorporate findings into detection content and response playbooks
Monitor and analyze DLP alerts for data exfiltration, data tagging, and compliance violations
Collaborate with teams to remediate and prevent data leakage incidents
Execute IR processes including detection, analysis, containment, eradication, and recovery
Document and track incidents using SOC workflows and ticketing systems
Monitor and assess security controls in AWS and Azure environments
Identify and remediate cloud-specific threats and misconfigurations
Support email security operations, including anti-phishing, anti-spam, malware detection, and incident response for email-based attacks
Stay current with emerging threats, vulnerabilities, and security technologies
Develop automation workflows and scripts to enhance SOC efficiency
Strong proficiency in Splunk SPL, dashboard creation, and Splunk Enterprise Security (ES)
Experience analyzing logs from diverse sources (Windows, Linux, EDR, firewalls, network traffic)
Hands-on experience in threat hunting and detecting APTs and insider threats
Knowledge of DLP solutions and compliance monitoring
Solid background in incident response operations
Understanding of cloud security controls for AWS and Azure
Familiarity with email security solutions and phishing mitigation
Excellent communication skills for conveying technical findings and business risk

Preferred

CISSP
Security+
Splunk Certified Power User
Splunk Enterprise Security Certified Admin
CEH
AWS and Azure security certifications

Benefits

Flexible work environment
Competitive benefits

Company

General Dynamics

company-logo
General Dynamics is a defense industry contractor for shipbuilding, marine, combat and defense systems and, munitions.

Funding

Current Stage
Public Company
Total Funding
$84.9M
2010-09-10Grant· $30M
2009-12-30Grant· $33.6M
2009-08-05Grant· $21.3M

Leadership Team

leader-logo
Lauren Bradshaw, SHRM-CP
Global Mobility Business Partner/ EAP
linkedin
leader-logo
Matthew Brandon, MSHR
Manager, Sr HR Business Partner
linkedin
Company data provided by crunchbase