Enable job alerts via email!

Local Defender / Security Operations Center SOC Analyst with Security

OASYS, INC.

California

On-site

USD 90,000 - 120,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

OASYS, INC., a leading government contractor, is seeking a Local Defender SOC Analyst to support Army operations at Camp Roberts, California. This role involves critical cybersecurity responsibilities including system monitoring, incident analysis, and collaboration in a fast-paced environment. Candidates should have a Bachelor's degree, relevant experience, and Security+ certification.

Qualifications

  • 10 years of relevant work experience.
  • Security+ or other DoD 8570/8140 IAT Level II certification required.
  • Proficient in analyzing security logs and alerts.

Responsibilities

  • Support Army customer with cybersecurity monitoring and analysis.
  • Investigate security incidents and recommend remediation strategies.
  • Generate detailed reports summarizing threats and incidents.

Skills

Analyzing security events
Monitoring security logs
Incident investigation
Threat intelligence frameworks
Vulnerability management

Education

Bachelor's Degree or higher

Tools

SIEM
Firewalls
IDS/IPS

Job description

Local Defender / Security Operations Center (SOC) Analyst

OASYS, INC.

OASYS, INC., a leading-edge government contractor, is seeking applicants for a Local Defender SOC Analyst position to support our Army customer at Camp Roberts in San Miguel, California.

Job Responsibilities include:
  1. Supporting our Army customer by providing a critical cybersecurity role through system monitoring and analysis support for the detection of cyber incidents and providing recommendations for remediation.
  2. Combining the duties of a SOC Analyst and Threat Analyst to ensure holistic defense against emerging threats.
  3. Monitoring security logs, analyzing and reporting cyber incidents, reviewing CVEs, and implementing directives from NETCOM (e.g., CTOs).
  4. Performing on-site work with occasional on-call duties for critical incidents in a collaborative, demanding environment.
  5. Monitoring and analyzing security events and alerts from SIEM platforms, firewalls, IDS/IPS, and endpoint detection tools to identify threats.
  6. Submitting and tracking service tickets for Operational Technology (OT) systems.
  7. Investigating security incidents to determine scope, impact, and root cause, and recommending remediation strategies.
  8. Researching the latest threat vectors, attack methodologies, and adversarial TTPs.
  9. Supporting configuration, tuning, and optimization of security monitoring tools.
  10. Generating detailed reports for leadership summarizing threats, incidents, and remediation steps.
Minimum Requirements:
  1. Bachelor's Degree or higher; additional experience may substitute for degree.
  2. Minimum of 10 years of relevant work experience.
  3. Security+ or other DoD 8570/8140 IAT Level II certification.
  4. Ability to work on-site daily.
  5. Proficiency in analyzing security events, logs, and alerts from various tools (e.g., SIEM, firewalls, IDS/IPS).
  6. Familiarity with CVEs, threat intelligence frameworks (e.g., MITRE ATT&CK), and vulnerability management.
  7. Knowledge of NETCOM policies, CTOs, and cybersecurity compliance.
  8. Proactive high-level performer capable of rapid response in a fast-paced environment.
  9. May require travel to CONUS and/or OCONUS customer sites.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.