×
Register Here to Apply for Jobs or Post Jobs. X

Defensive Cyber Operations Watch Analyst Tier II

Job in North Charleston, Charleston County, South Carolina, 29405, USA
Listing for: Adapt Forward
Full Time position
Listed on 2026-01-19
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Job Description & How to Apply Below

Cyber Security Analyst I, DCO Watch Analyst Tier II – North Charleston, SC

Secret Clearance required to start, with ability to obtain TS/SCI.

As a Tier 2 Defensive Cyber Operations (DCO) Watch Analyst you will responsible for analyzing and responding to security incidents within a Cybersecurity Service Provider (CSSP) environment. In addition to investigating validated events and mitigating incidents, you will help improve the quality of Tier 1 analysis by mentoring junior analysts. You will also assist the watch officer as needed, work on projects to enhance CSSP capabilities, and perform independent problem‑solving while adhering to CJCSM 6510.01B reporting standards.

Position Requirements and Duties
  • Analyze and respond to validated security incidents, determining severity and impact per CJCSM 6510.01B
  • Support incident response campaigns by organizing response efforts, tracking progress, and ensuring proper documentation
  • Coordinate with reporting agencies and subscriber sites to ensure timely and accurate incident reporting
  • Perform network and host‑based digital forensics on Windows and other operating systems as needed
  • Conduct log correlation analysis using Splunk and supplemental tools to identify patterns in network and system activity
  • Compile and maintain internal SOP documentation, ensuring compliance with CJCSM 6510.01B and other directives
  • Provide 24/7 support for incident response during assigned shifts, including non‑core hours
  • Support IDS/IPS signature development and implementation under guidance
  • Overtime may be required to support incident response actions (Surge)
  • Operations are conducted 24/7/365 across three regional operation centers (ROC)
  • Each ROC works four ten‑hour shifts (Sunday‑Wednesday or Wednesday‑Saturday)
  • Shift placement is at the discretion of assigned managers
  • Up to 10% travel may be required, may include international travel
  • Must maintain a current US Passport
Minimum Qualifications
  • Bachelor’s Degree in relevant discipline or at least 5 years of experience working in a CSSP, SOC, or similar environment
  • At least 1 year experience conducting in‑depth analysis or incident response with any of the following tools:
    Splunk, Elastic, Corelight, Palo Alto Panorama, Windows Azure/Defender, AWS, Crowdstrike, Volatility, or SIFT Workstation
  • At least 1 year of experience authoring technical documentation for security incidents, such as creating detailed investigation timelines, documenting indicators of compromise (IOCs), or writing shift turnover reports for ongoing incidents
  • Must be a U.S. Citizen
Desired Qualifications
  • Demonstrated experience conducting in‑depth log correlation and analysis for complex security incidents across multiple data sources (e.g., EDR, IDS/IPS, DNS, & operating system logging solutions)
  • Advanced proficiency in writing complex search queries in SIEM platforms (e.g., Splunk, Elastic, Sentinel) to identify anomalous or malicious activity
  • Experience building advanced scripts (e.g., in Python, Power Shell, Bash, etc.) to automate detection and analysis tasks
  • Experience integrating and operationalizing threat intelligence feeds to create new detection mechanisms or enrich existing data
  • Previous experience informally mentoring junior analysts, creating training documentation, or leading small‑group knowledge‑sharing sessions
  • Demonstrated passion for cybersecurity and continuous learning through active participation in Capture the Flag (CTF) events, (e.g., Try Hack Me , Hack The Box, etc)
  • Completion of practical, hands‑on cybersecurity training courses or certifications (e.g., Security Blue Team BTL1/BTL2, Anti Syphon training courses, Off Sec OSCP)
Required Certifications
  • Must have DoD 8570 IAT Level II and CSSP IR compliant certifications
Company Overview

Adapt Forward is a cybersecurity solutions provider for some of the nation’s most valuable information systems. Leveraging advanced threat assessment technology and experience in building high‑level information security infrastructure, we develop adaptive solutions uniquely tailored to our customers’ business objectives to protect sensitive data against sophisticated threats in an increasingly complex security environment.

Summary…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary