×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Battle Watch Captain Security Clearance

Job in Charleston, Charleston County, South Carolina, 29401, USA
Listing for: Sentar Inc
Full Time position
Listed on 2026-01-25
Job specializations:
  • IT/Tech
    Cybersecurity
Job Description & How to Apply Below
Position: Battle Watch Captain with Security Clearance
Sentar is proud to be an employee-owned company, fostering a culture of empowerment, collaboration, and innovation. Sentar is dedicated to developing the critical talent that the connected world demands to create solutions to address the convergence of cybersecurity, intelligence, analytics, and systems engineering. We invite you to join the team where you can build, innovate, and secure your career. Sentar is seeking a Battle Watch Captain in Charleston, SC.

Role

Description:

The Battle Watch Captain serves as the focal point for 24/7/365 network monitoring and cyber defense coordination within a cybersecurity operations environment. This leadership role oversees a team of Tier 2 analysts, guiding and mentoring them to ensure continuous and effective monitoring of subscriber networks and swift response to cyber threats. The Battle Watch Captain is responsible for maintaining operational effectiveness by assigning tasks, monitoring performance, and ensuring adherence to established analytical frameworks, organizational policies, and industry standards.

This role also acts as a crucial liaison for external communications, facilitating coordination between internal teams, subscribers, United States Cyber Command (USCYBERCOM), Joint Force Headquarters Department of Defense Information Networks (JFHQ-DODIN), and peer cybersecurity operations teams. The Battle Watch Captain plays a pivotal role in protecting subscriber networks and maintaining the security posture of organizational infrastructure.

Key Responsibilities:

* Lead and guide incident response (IR) and investigation processes during campaigns, ensuring tasks are completed, properly documented, and vetted.
* Coordinate with reporting agencies and subscriber sites to ensure timely and accurate incident reporting.
* Analyze and respond to validated security incidents, determining severity and impact per Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510.01B.
* Conduct log correlation analysis using applicable tools to identify patterns in network and system activity.
* Perform network and host-based digital forensics on Windows and other operating systems as needed.
* Support Intrusion Detection/Prevention Systems (IDS/IPS) signature development and implementation under guidance.
* Maintain an in-depth understanding of security concepts, protocols, processes, architectures, and tools.
* Conduct ticket reviews and indicator/analysis quality control.
* Ensure proper turnover of tasks and findings within verbal turnover and shift roll-up documentation.
* Compile and maintain internal Standard Operating Procedure (SOP) documentation, ensuring compliance with CJCSM 6510.01B and other directives.
* Provide mentorship to Tier 2 analysts to improve triage efficacy.
* Conduct operations 24/7/365 across three Regional Operation Centers (ROCs).

Qualifications:

* Secret, with ability to obtain Top Secret / Sensitive Compartmented Information (TS/SCI) Clearance Level: Education/

Experience:

* Bachelors Degree in a relevant discipline with 5 years of experience, or at least 8 years of experience in a cybersecurity operations environment, Security Operations Center (SOC), or similar environment.
* 2+ years of experience leading or managing incident response cases Required

Certifications:

* Department of Defense (DoD) Information Assurance Technical (IAT) Level III (IAT-III) certification
* Certified Network Defender (CND) certification Preferred:
* Comprehensive knowledge of CJCSM 6510.01B
* Expert knowledge of incident response procedures and coordination
* Expertise in IDS/IPS solutions, including signature development and optimization
* Experience with digital forensics across multiple operating systems
* Advanced proficiency with host-based tools and operating system logging Highly desired:
* Deep expertise in log aggregation tools (e.g., Splunk, Elastic, Microsoft Sentinel) for complex correlation analysis
* Exceptional logical thinking and analytical ability
* Superior verbal and written communication skills
* Proven ability to solve complex problems independently Benefits at Sentar:
Our unique ownership model attracts top talent, giving employees the freedom to take initiative and drive meaningful improvements. In addition to cultivating a thriving and inclusive work environment, Sentar offers an extensive benefits package designed to support the well-being of employees and their families. Employee ownership is the foundation of our culture, promoting participation, teamwork, and accountability while ensuring long-term financial security and a commitment to excellence.

* Voluntary Medical, Dental, Vision, with Health Savings or Flexible Spending Plan options
* Voluntary Life, Critical Illness, Accident, and Long Term Care insurance options
* Group Term Life, Short-Term and Long-Term Disability is provided by Sentar to all qualifying employees
* Generous 401(k) match
* Competitive PTO plan that graduates quickly with years of service
* Other leave programs; holiday…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary