×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Battle Watch Captain

Job in Pearl City, Honolulu County, Hawaii, 96782, USA
Listing for: Sentar
Full Time position
Listed on 2026-01-11
Job specializations:
  • IT/Tech
    Cybersecurity
Job Description & How to Apply Below

Current job opportunities are posted here as they become available.

Subscribe to our RSS feeds to receive instant updates as new positions become available.

Sentar is proud to be an employee‑owned company, fostering a culture of empowerment, collaboration, and innovation. Sentar is dedicated to developing the critical talent that the connected world demands to create solutions to address the convergence of cybersecurity, intelligence, analytics, and systems engineering. We invite you to join the team where you can build, innovate, and secure your career.

Sentar is seeking a Battle Watch Captain in Hawaii!

Role Description

The Battle Watch Captain serves as the focal point for 24/7/365 network monitoring and cyber defense coordination within a cybersecurity operations environment. This leadership role oversees a team of Tier 2 analysts, guiding and mentoring them to ensure continuous and effective monitoring of subscriber networks and swift response to cyber threats.

The Battle Watch Captain is responsible for maintaining operational effectiveness by assigning tasks, monitoring performance, and ensuring adherence to established analytical frameworks, organizational policies, and industry standards. This role also acts as a crucial liaison for external communications, facilitating coordination between internal teams, subscribers, United States Cyber Command (USCYBERCOM), Joint Force Headquarters–Department of Defense Information Networks (JFHQ‑DODIN), and peer cybersecurity operations teams.

The Battle Watch Captain plays a pivotal role in protecting subscriber networks and maintaining the security posture of organizational infrastructure.

Key Responsibilities
  • Lead and guide incident response (IR) and investigation processes during campaigns, ensuring tasks are completed, properly documented, and vetted.
  • Coordinate with reporting agencies and subscriber sites to ensure timely and accurate incident reporting.
  • Analyze and respond to validated security incidents, determining severity and impact per Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510.01B.
  • Conduct log correlation analysis using applicable tools to identify patterns in network and system activity.
  • Perform network and host‑based digital forensics on Windows and other operating systems as needed.
  • Support Intrusion Detection/Prevention Systems (IDS/IPS) signature development and implementation under guidance.
  • Maintain an in-depth understanding of security concepts, protocols, processes, architectures, and tools.
  • Conduct ticket reviews and indicator/analysis quality control.
  • Ensure proper turnover of tasks and findings within verbal turnover and shift roll‑up documentation.
  • Compile and maintain internal Standard Operating Procedure (SOP) documentation, ensuring compliance with CJCSM 6510.01B and other directives.
  • Provide mentorship to Tier 2 analysts to improve triage efficacy.
  • Conduct operations 24/7/365 across three Regional Operation Centers (ROCs).
Qualifications Clearance Level
  • Secret, with ability to obtain Top Secret / Sensitive Compartmented Information (TS/SCI)
Education/Experience
  • Bachelor’s Degree in a relevant discipline with 5 years of experience, or at least 8 years of experience in a cybersecurity operations environment, Security Operations Center (SOC), or similar environment.
  • 2+ years of experience leading or managing incident response cases
Required Certifications
  • Department of Defense (DoD) Information Assurance Technical (IAT) Level III (IAT‑III) certification
Preferred
  • Comprehensive knowledge of CJCSM 6510.01B
  • Expert knowledge of incident response procedures and coordination
  • Expertise in IDS/IPS solutions, including signature development and optimization
  • Experience with digital forensics across multiple operating systems
  • Advanced proficiency with host‑based tools and operating system logging
Highly desired
  • Deep expertise in log aggregation tools (e.g., Splunk, Elastic, Microsoft Sentinel) for complex correlation analysis
  • Exceptional logical thinking and analytical ability
  • Superior verbal and written communication skills
  • Proven ability to solve complex problems independently
Benefits at Sentar

Our unique ownership model attracts top talent,…

To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary