General Dynamics · 18 hours ago
Cybersecurity SOC Analyst
General Dynamics Mission Systems (GDMS) is seeking a Cybersecurity SOC Analyst with expertise in Splunk Enterprise Security and a strong background in threat detection and incident response. The role involves monitoring, analyzing, and responding to security events across GDMS’s enterprise and cloud environments, as well as collaborating with teams to enhance security posture.
AerospaceNational SecurityPublic Transportation
Responsibilities
Develop and optimize Splunk SPL queries, dashboards, and correlation searches within Splunk Enterprise Security (ES)
Maintain and enhance Splunk content for detection and reporting
Analyze logs from multiple sources, including Windows Event Logs, Linux system logs, CrowdStrike telemetry, firewall logs, and network traffic
Investigate alerts to identify potential security incidents and anomalous behavior
Conduct proactive threat hunting to detect advanced persistent threats (APTs), insider threats, and suspicious activity across enterprise networks
Incorporate findings into detection content and response playbooks
Monitor and analyze DLP alerts for data exfiltration, data tagging, and compliance violations
Collaborate with teams to remediate and prevent data leakage incidents
Execute IR processes including detection, analysis, containment, eradication, and recovery
Document and track incidents using SOC workflows and ticketing systems
Monitor and assess security controls in AWS and Azure environments
Identify and remediate cloud-specific threats and misconfigurations
Support email security operations, including anti-phishing, anti-spam, malware detection, and incident response for email-based attacks
Stay current with emerging threats, vulnerabilities, and security technologies
Develop automation workflows and scripts to enhance SOC efficiency
Qualification
Required
Bachelor's degree in a related specialized area or equivalent is required plus a minimum of 2 years of relevant experience; or Master's degree plus a minimum of 0 years of relevant experience
Due to the nature of work performed within our facilities, U.S. citizenship is required
Advanced expertise in Splunk Enterprise Security (ES)
Strong background in threat detection, incident response, and cloud security
Hands-on experience with Splunk SPL, dashboard creation, and correlation searches
Proficiency in analyzing logs from diverse sources
Conducting threat hunts and improving detection capabilities
Collaboration with cross-functional teams to mitigate risks and respond to incidents
Develop and optimize Splunk SPL queries, dashboards, and correlation searches within Splunk Enterprise Security (ES)
Maintain and enhance Splunk content for detection and reporting
Analyze logs from multiple sources, including Windows Event Logs, Linux system logs, CrowdStrike telemetry, firewall logs, and network traffic
Investigate alerts to identify potential security incidents and anomalous behavior
Conduct proactive threat hunting to detect advanced persistent threats (APTs), insider threats, and suspicious activity across enterprise networks
Incorporate findings into detection content and response playbooks
Monitor and analyze DLP alerts for data exfiltration, data tagging, and compliance violations
Collaborate with teams to remediate and prevent data leakage incidents
Execute IR processes including detection, analysis, containment, eradication, and recovery
Document and track incidents using SOC workflows and ticketing systems
Monitor and assess security controls in AWS and Azure environments
Identify and remediate cloud-specific threats and misconfigurations
Support email security operations, including anti-phishing, anti-spam, malware detection, and incident response for email-based attacks
Stay current with emerging threats, vulnerabilities, and security technologies
Develop automation workflows and scripts to enhance SOC efficiency
Strong proficiency in Splunk SPL, dashboard creation, and Splunk Enterprise Security (ES)
Experience analyzing logs from diverse sources (Windows, Linux, EDR, firewalls, network traffic)
Hands-on experience in threat hunting and detecting APTs and insider threats
Knowledge of DLP solutions and compliance monitoring
Solid background in incident response operations
Understanding of cloud security controls for AWS and Azure
Familiarity with email security solutions and phishing mitigation
Excellent communication skills for conveying technical findings and business risk
Preferred
CISSP
Security+
Splunk Certified Power User
Splunk Enterprise Security Certified Admin
CEH
AWS and Azure security certifications
Benefits
Flexible work environment
Competitive benefits
Company
General Dynamics
General Dynamics is a defense industry contractor for shipbuilding, marine, combat and defense systems and, munitions.
Funding
Current Stage
Public CompanyTotal Funding
$84.9M2010-09-10Grant· $30M
2009-12-30Grant· $33.6M
2009-08-05Grant· $21.3M
Leadership Team
Recent News
Business Insider
2026-01-09
2026-01-09
Company data provided by crunchbase