Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy, and consent to receive emails from Rise
Jobs / Job page
Local Defender - Cybersecurity (SOC & Threat Analyst) image - Rise Careers
Job details

Local Defender - Cybersecurity (SOC & Threat Analyst)

Opportunity

PeopleTec is currently seeking a Local Defender - Cybersecurity (SOC & Threat Analyst) to support our Sunny Point Army Ammunition Plant, Southport, NC location.

 

The Local Defender is a critical cybersecurity role responsible for protecting the organization's digital assets through proactive monitoring, analysis, and response to cyber threats. This role combines the duties of a Security Operations Center (SOC) Analyst and Threat Analyst to ensure a holistic defense against emerging threats. Key responsibilities include monitoring security logs, analyzing and reporting cyber incidents, reviewing Common Vulnerabilities and Exposures (CVEs), and implementing directives from NETCOM (e.g., Cyber Tasking Orders – CTO). Work is performed on-site with occasional on-call duties for critical incidents in a collaborative, demanding environment requiring attention to emerging threats and vulnerabilities.

 

The preferred candidate will be well-versed in common cyber threats, vulnerabilities, and adversarial tactics, techniques, and procedures (TTPs). In this role, the candidate is expected to work with minimal guidance, in a cross-functional team, ensuring reports and recommendations are effectively communicated and actioned to support the Government customer and mission requirements.

 

Duties:

 

SOC Activities and Duties

  • Monitor and analyze security events and alerts generated by SIEM platforms, firewalls, IDS/IPS, and endpoint detection tools to identify potential threats and anomalous behavior.
  • Analyze potential security incidents and investigate to determine the scope, impact, root cause, and recommend effective remediation strategies.
  • Perform triage on security incidents to identify root causes and recommend appropriate mitigation measures.
  • Conduct regular reviews of SIEM reports to identify patterns, trends, and potential vulnerabilities within the organization's infrastructure.
  • Develop actionable recommendations based on SIEM data analysis to enhance detection capabilities, optimize alert configurations, and address identified gaps.
  • Escalate critical incidents to senior leadership or appropriate teams and provide detailed incident summaries with proposed mitigation actions.
  • Maintain accurate documentation of security events and incident-handling procedures.

 

Threat Analysis & Intelligence

  • Monitor and evaluate Cyber Tasking Orders (CTOs) and other directives from NETCOM, ensuring compliance and timely implementation of mitigations.
  • Conduct research on the latest organization’s environment threat vectors, attack methodologies, and adversarial tactics, techniques, and procedures (TTPs).
  • Collaborate with other cybersecurity team members and the government customer to integrate threat intelligence into incident detection and response processes.
  • Analyze CVEs, security bulletins, threat intelligence feeds, and security advisories to assess their relevance and potential impact to the mission and the organization’s environment.
  • Correlate threat intelligence with SIEM findings to identify and assess emerging threats.
  • Develop and communicate proactive mitigation strategies based on threat landscape trends and adversary tactics.

 

Reporting & Communication

  • Generate detailed and actionable reports for leadership from SIEM platforms summarizing identified threats, incidents, and remediation steps.
  • Provide recommendations for improving the organization’s cybersecurity posture based on incident trends and threat intelligence.
  • Maintain clear communication with cross-functional teams to ensure alignment with security objectives and protocols.
  • Generate detailed reports threats, false positives, and actionable insights.
  • Provide the Government customer and leadership with concise, data-driven recommendations for enhancing the organization’s cybersecurity defenses based on SIEM trends and incident analysis.
  • Prepare summaries and status updates of security posture improvements resulting from SIEM data analysis and implemented recommendations.

 

Security Tool Management & Optimization

  • Support the configuration, tuning, and optimization of security monitoring tools, including SIEM and threat detection platforms.
  • Conduct periodic reviews and updates of security tools to address gaps or inefficiencies.
  • Participate in the testing and implementation of new security technologies as required.
  • Collaborate with the team and the stakeholder community to fine-tune SIEM configurations, including custom rule creation and log source integration, to improve threat detection accuracy.
  • Conduct periodic evaluations of SIEM and related tools, providing recommendations for feature enhancements or additional capabilities.
  • Support the testing and deployment of security solutions to ensure seamless integration with the existing monitoring infrastructure.

 

Qualifications

Required Skills/Experience:

  • 2+ years of experience in a SOC, cybersecurity, or related role.
  • CISSP, CompTIA Security+, CySA+, CEH, or GIAC certifications (e.g., GCIH, GCIA), Splunk Core Certified User / Power User, Cisco Certified CyberOps Associate.
  • Proficiency in analyzing security events, logs, and alerts from various security tools (e.g., SIEM, firewalls, IDS/IPS).
  • Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.
  • Experience in other tools and protocols as applicable such as Nessus, Endgame, CrowdStrike, Gray Noise, Shodan, Bacnet, MODBus, SCADA systems, and PCAP.
  • Knowledge of threat intelligence frameworks (e.g., MITRE ATT&CK), and vulnerability management practices.
  • Knowledge of NETCOM policies, Cyber Tasking Orders (CTOs), and cybersecurity compliance requirements.
  • Strong analytical and problem-solving skills with attention to detail.
  • Must be a U.S. Citizen
  • An active DoD Secret clearance is required to perform this work. Candidates are required to have an active Secret clearance upon hire, and the ability to maintain this level of clearance during their employment.

 

Education Requirements:

  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field (or equivalent experience).

Physical Requirements:

  • Requires working on-site and as needed during incidents.

Desired Skills:

  • GIAC Penetration Tester (GPEN)
  • Offensive Security Certified Professional (OSCP)
  • Experience with scripting languages (e.g., Python, PowerShell) for automating security tasks.
  • Understanding of advanced threat detection methodologies and incident response processes.
  • Excellent verbal and written communication skills for creating technical reports and presentations.

Overview

People First. Technology Always.

 

PeopleTec, Inc. is an employee-owned small business founded in Huntsville, AL that provides exceptional customer support by employing and retaining a highly skilled workforce.

 

Culture: The name "PeopleTec" was deliberately chosen to remind us of our core value system - our people. Our company's foundation was built on placing our employees and customers first. With an award-winning atmosphere, we have matured into a company that boasts the best and brightest across multiple technical fields.

 

Career: At PeopleTec, we value your long-term goals. Whether it's through our continuing-education opportunities, our robust training programs, or our "People First" benefits package, PeopleTec truly believes that our best investments are our people.

 

Come Experience It.

#cjpost #dpost

 

EEO Statement

 

PeopleTec, Inc. is an Equal Employment Opportunity employer and provides reasonable accommodation for qualified individuals with disabilities and disabled veterans in its job application procedures. If you have any difficulty using our online system and you need an accommodation due to a disability, you may use the following email address, applicationhelp@peopletec.com and/or phone number (256.319.3800) to contact us about your interest in employment with PeopleTec, Inc.

 

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, genetic information, citizenship, ancestry, marital status, protected veteran status, disability status or any other status protected by federal, state, or local law. PeopleTec, Inc. participates in E-Verify.

Average salary estimate

$75000 / YEARLY (est.)
min
max
$60000K
$90000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

Similar Jobs
Posted 11 days ago

Join Zip’s Engineering team as a Senior Security Engineer to lead cloud security initiatives in a dynamic, remote-first environment.

DataHub Remote Palo Alto, California, United States
Posted 11 days ago

Join DataHub as an IT Security and Compliance Manager and play a crucial role in shaping our corporate IT landscape to enhance security and compliance frameworks.

Photo of the Rise User

We seek a skilled Endpoint and IS Security Specialist to enhance our IT support and security compliance efforts in a dynamic environment.

Photo of the Rise User
Posted 11 days ago

Become an integral part of Woongjin, Inc. as a Linux/Unix System Administrator, ensuring optimal system performance and security.

Photo of the Rise User
Posted 9 days ago

Become the driving force behind AI integration as a Senior Business Systems Analyst at Trace3, a transformative IT Authority based in Irvine, CA.

BCI Brands Hybrid No location specified
Posted 3 days ago

Join BCI in transforming the fashion industry as an IT Solutions Analyst, dedicated to enhancing customer experience through technical support.

Photo of the Rise User
Veolia Environnement SA Hybrid 2138 PA-18, Wampum, PA 16157, USA
Posted 3 days ago

As an IT Support Specialist at Veolia North America, you'll play a crucial role in delivering top-notch technical assistance to our diverse client base.

Photo of the Rise User
KU Endowment Hybrid Lawrence, Kansas, United States
Posted 2 days ago

We are looking for a skilled Salesforce Marketing Cloud Developer to optimize our data usage and enhance our fundraising efforts at KU Endowment.

Join CommonSpirit Health as an Associate Technical Analyst, where your technical expertise will support vital healthcare applications.

Ellington Solutions is in search of a skilled Automation and Cloud Services Engineer to enhance cloud and automation capabilities for C5ISR systems.

Photo of the Rise User

Join Yggdrasil as an Information Security and Data Protection Specialist and lead the charge in safeguarding customer data within a dynamic gaming environment.

Photo of the Rise User
City of New York Hybrid New York City, NY
Posted 3 days ago

Join the NYC Department of Consumer and Worker Protection as an IT OPS Intern and gain hands-on experience in a government IT environment.

Seeking a skilled Information System Security Officer to join Constellation Technologies and safeguard our information systems while adhering to stringent security protocols.

Founded in April 2005, PeopleTec, Inc. is an employee-owned small business dedicated to cultivating a people-centric workplace while providing technical excellence to the defense community in support of the warfighter. Our company tagline “People ...

8 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
April 18, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!