Cybersecurity Analyst - Operations Watch Analyst

Sorry, this job was removed at 04:15 p.m. (CST) on Tuesday, Jun 24, 2025
North Charleston, SC
In-Office
Security • Cybersecurity
The Role

Cyber Security Analyst - Operations Watch Analyst
North Charleston, SC 
Minimum of a Secret Clearance Required with ability to obtain TS/SCI

Position Description
As an Operations Watch Analyst, you will isolate, investigate, inform, and implement measures to detect and protect data across a wide spectrum of sources and locations. The candidate is required to validate suspicious events or reports and determine if the event constitutes an incident. The candidate will ensure incidents are properly entered into the appropriate reporting system and determine the severity of the incident. Reporting and response measures will be taken immediately in order to satisfy the Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510.01B reporting requirements.
Position Requirements and Duties
•    Maintains familiarity with CJCSM 6510.01B.
•    Compiles and maintains internal standard operating procedure (SOP) documentation.
•    Ensures associated documentation and capabilities remain compliant with CJCSM 6510.01B and other applicable policy directives.
•    Provides network intrusion detection and monitoring, correlation analysis, incident response and support for the Cybersecurity Service Provider (CSSP) and its subscriber sites.
•    Validates suspicious events or reports and determine if the event constitutes an incident and properly enter associated data into the appropriate reporting systems.
•    Coordinates with JFHQ-DoDIN and supported entities regarding significant incidents to ensure proper analysis is performed and timely and accurate reporting of the incident is completed.
•    Provides 24x7 support for the CSSP’s Incident Response capability during non-core business hours consistent with CSSP requirements as needed.
•    Performs network and host-based digital forensics on Microsoft Windows based systems and other operating systems as necessary to enhance response to, support of, and investigation into significant network incidents.
•    Possesses working knowledge of full packet capture PCAP analysis and accompanying tools (Wireshark, etc.).
•    Explores patterns in network and system activity via log correlation using Splunk and supplemental tools
•    Possesses understanding of IDS/IPS solutions to include signature development and implementation
•    Participates in program reviews, product evaluations, and onsite certification evaluations.
•    Overtime may be required as needed to support incident response actions (Surge)
•    Due to the nature of the work required, operations are conducted 24/7/365 with three primary shifts. Choice of shifts will be made available with the understanding that placement is at the discretion of the CSSP Services Director and/or assigned manager.
•    This position requires a shift of four (4) ten-hour days per week, which includes one weekend day. Example schedules may include Wednesday to Saturday or Sunday to Wednesday.
Minimum Qualifications
•    US Citizen
•    Bachelor’s degree in a relevant discipline OR at least three years of directly relevant experience, preferably in a DoD environment.
•    Up to 15% global travel may be required; emergency travel may be required with 72-hour notice for incident response and to support other program needs.
Preferred Qualifications
•    At least five years of incident response experience
•    The ability to solve problems independently
•    Knowledge of Incident Response Procedures
•    Knowledge of Packet Analysis
•    Knowledge of IDS/IPS solutions
•    Familiarity with various Host-Based Tool
•    Experience with Log Aggregation Tools
•    Logical thinking and analytical ability
•    Verbal and written communication ability
•    Highly Desired Skills
•    Knowledge of CJCSM 6510.01B
•    Experience with Digital Forensics
•    The ability to solve problems independently

 

Required Certifications
•    IATII and CSSP Compliant Certifications

Similar Jobs

Snap! Mobile Logo Snap! Mobile

Account Executive

Edtech • Fintech • Sports
Easy Apply
In-Office
Columbia, SC, USA
350 Employees
75K-95K Annually

PwC Logo PwC

Salesforce Engineer

Artificial Intelligence • Professional Services • Business Intelligence • Consulting • Cybersecurity • Generative AI
Hybrid
52 Locations
370000 Employees
212K-244K Annually

Samsara Logo Samsara

Account Executive

Artificial Intelligence • Cloud • Computer Vision • Hardware • Internet of Things • Software
Easy Apply
Hybrid
Columbia, SC, USA
4000 Employees
338K-338K Annually

Datadog Logo Datadog

Account Executive

Artificial Intelligence • Cloud • Security • Software • Cybersecurity
Easy Apply
Remote or Hybrid
3 Locations
6500 Employees
135K-150K Annually
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: North Charleston, SC
90 Employees
Year Founded: 2015

What We Do

Adapt Forward specializes in Defensive and Offensive cyber operations. We strive to rewrite the rulebook on how Cyber Defense and Incident response is done with a unique blend of offense to validate our defense.

Similar Companies Hiring

Oso Thumbnail
Software • Security • Infrastructure as a Service (IaaS)
New York, New York
36 Employees
Credal.ai Thumbnail
Software • Security • Productivity • Machine Learning • Artificial Intelligence
Brooklyn, NY
Milestone Systems Thumbnail
Software • Security • Other • Big Data Analytics • Artificial Intelligence • Analytics
Lake Oswego, OR
1500 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account