General Dynamics Mission Systems · 13 hours ago
Cybersecurity SOC Analyst
General Dynamics Mission Systems (GDMS) is seeking a Cybersecurity SOC Analyst with expertise in Splunk Enterprise Security and a strong background in threat detection and incident response. This role is critical for monitoring, analyzing, and responding to security events across GDMS’s enterprise and cloud environments.
AerospaceBusiness Information SystemsInformation ServicesInformation TechnologyNational SecuritySensor
Responsibilities
Develop and optimize Splunk SPL queries, dashboards, and correlation searches within Splunk Enterprise Security (ES)
Maintain and enhance Splunk content for detection and reporting
Analyze logs from multiple sources, including Windows Event Logs, Linux system logs, CrowdStrike telemetry, firewall logs, and network traffic
Investigate alerts to identify potential security incidents and anomalous behavior
Conduct proactive threat hunting to detect advanced persistent threats (APTs), insider threats, and suspicious activity across enterprise networks
Incorporate findings into detection content and response playbooks
Monitor and analyze DLP alerts for data exfiltration, data tagging, and compliance violations
Collaborate with teams to remediate and prevent data leakage incidents
Execute IR processes including detection, analysis, containment, eradication, and recovery
Document and track incidents using SOC workflows and ticketing systems
Monitor and assess security controls in AWS and Azure environments
Identify and remediate cloud-specific threats and misconfigurations
Support email security operations, including anti-phishing, anti-spam, malware detection, and incident response for email-based attacks
Stay current with emerging threats, vulnerabilities, and security technologies
Develop automation workflows and scripts to enhance SOC efficiency
Qualification
Required
Bachelor's degree in a related specialized area or equivalent is required plus a minimum of 2 years of relevant experience; or Master's degree plus a minimum of 0 years of relevant experience
U.S. citizenship is required
Advanced expertise in Splunk Enterprise Security (ES)
Strong background in threat detection, incident response, and cloud security
Hands-on experience with Splunk SPL, dashboard creation, and correlation searches
Proficiency in analyzing logs from diverse sources
Experience conducting threat hunts
Ability to improve detection capabilities
Collaboration with cross-functional teams to mitigate risks
Experience in monitoring, analyzing, and responding to security events
Develop and optimize Splunk SPL queries, dashboards, and correlation searches
Maintain and enhance Splunk content for detection and reporting
Analyze logs from multiple sources, including Windows Event Logs, Linux system logs, CrowdStrike telemetry, firewall logs, and network traffic
Investigate alerts to identify potential security incidents and anomalous behavior
Conduct proactive threat hunting to detect advanced persistent threats (APTs), insider threats, and suspicious activity across enterprise networks
Incorporate findings into detection content and response playbooks
Monitor and analyze DLP alerts for data exfiltration, data tagging, and compliance violations
Collaborate with teams to remediate and prevent data leakage incidents
Execute IR processes including detection, analysis, containment, eradication, and recovery
Document and track incidents using SOC workflows and ticketing systems
Monitor and assess security controls in AWS and Azure environments
Identify and remediate cloud-specific threats and misconfigurations
Support email security operations, including anti-phishing, anti-spam, malware detection, and incident response for email-based attacks
Stay current with emerging threats, vulnerabilities, and security technologies
Develop automation workflows and scripts to enhance SOC efficiency
Strong proficiency in Splunk SPL, dashboard creation, and Splunk Enterprise Security (ES)
Experience analyzing logs from diverse sources (Windows, Linux, EDR, firewalls, network traffic)
Hands-on experience in threat hunting and detecting APTs and insider threats
Knowledge of DLP solutions and compliance monitoring
Solid background in incident response operations
Understanding of cloud security controls for AWS and Azure
Familiarity with email security solutions and phishing mitigation
Excellent communication skills for conveying technical findings and business risk
Preferred
CISSP
Security+
Splunk Certified Power User
Splunk Enterprise Security Certified Admin
CEH
AWS and Azure security certifications
Benefits
Flexible work environment
Competitive benefits
Company
General Dynamics Mission Systems
General Dynamics Mission Systems designs and delivers critical systems and products for defense and cybersecurity customers. It is a sub-organization of General Dynamics.
Funding
Current Stage
Late StageRecent News
Washington Technology
2026-01-17
Company data provided by crunchbase