We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results

Cyber Security Operations Engineer (Mid-Career Level)

General Dynamics Land Systems
401(k)
United States, Michigan, Sterling Heights
38500 Mound Road (Show on map)
Jan 10, 2025


Overview:

The Security Analyst (Level 2) will perform responsibilities as the next level support for incident responder at General Dynamics Land Systems' Security Operations Center (SOC). This position serves as a technical escalation resource for other SOC Analysts and provide mentoring for skill development. Partner with IT Engineers to implement and improve technology and process to enhance SOC monitoring, investigation, and response.

Company Information:

General Dynamics is a successful Fortune 100, global aerospace and defense company, with over 90,000 employees world-wide. General Dynamics Land Systems, a business unit of General Dynamics, has a strong foundation of delivering core engineering and manufacturing capabilities to our clients for military vehicles. Our team is focused on continuous process and productivity improvements that reduce product costs, while increasing troop safety and effectiveness. Land Systems continues to work with the US Armed Forces and its Allies to ensure these vehicles remain survivable, relevant, flexible, affordable and capable of addressing a dynamic threat environment.

What We Offer:

Starting your career or you are an experience professional, we offer a Total Rewards package that is Impactful and built for you.
  • Healthcare including medical, dental, vision, HSA and Flex Spending
  • Competitive base pay and incentive pay that rewards individual and team performance, and comprehensive benefits.
  • 401k Match (6%)
  • Educational Assistance
  • 9-80 Work Schedule (This position's standard work schedule is a 9/80. The 9/80 schedule allows employees who work a nine-hour day Monday through Thursday to take every other Friday off)
  • On-going learning opportunities within a diverse, inclusive and rewarding work environment
  • Onsite cafeteria, fitness center, and outdoor fitness track


Responsibilities to Anticipate/Expect:

  • Use SIEM software intended to ensure that GDLS systems are secure from unauthorized use, viral infection, and other problems that would compromise sensitive information in terms of confidentiality, integrity, and availability, or would compromise other aspects of overall system security.
  • Perform internal audits on security logging systems.
  • Serve as an escalation resource and mentor for other analysts
  • Perform investigation and escalation for complex or high severity security threats or incidents
  • Work with SIEM Engineering and other security partners developing and refining correlation rules
  • Work on complex tasks assigned by leadership, which may involve coordination of effort among Level 1/2 analysts
  • Coordinate evidence/data gathering and documentation and review Security Incident reports
  • Create and develop SOC processes and procedures working with Level 1 Analysts
  • Define and assist in creation of operational and executive reports
  • Define tool requirements to improve SOC capabilities
  • Support the email relay team to manage spam and phishing rules
  • Share threat intelligence from GDLS through the intel sharing platform to the rest of the corporation.


Minimum Qualifications:

  • Bachelor of Science degree majoring in Computer Science or Information Assurance (preferred) or related work experience.
  • 5 - 7 on the job experience in intrusion correlation/analytics using SIEM and EDR tools, incident handling/response, and security operations.
  • Security Certifications Preferred (Including but not limited to the following certifications):
    • SANS/GIAC Intrusion Analyst (GCIA) training / certification
    • Certified Incident Handler (GCIH)
    • Certified Intrusion Analyst (GIAC)
    • Certified Ethical Hacker (CEH)
    • Certified Information Systems Security Professional (CISSP)
    • Networking Certifications (CCNA, etc)
    • Platform Certifications (Microsoft, Linux, Solaris, etc)
  • Must have networking experience and understand the TCP/IP stack.
  • Must have very good written and verbal communication skills.
  • Must have strong analytical skills.
  • Must be detail-oriented, independent and organized.
  • Must have experience with Microsoft Office products: Excel, PowerPoint, and Visio.
  • Must have ability to conduct multi-step breach and investigative analysis to trace the dynamic activities associated with advanced threats.
  • Must have experience with SIEM and EDR tools (log parsing and analysis skillset).
  • Must have advanced knowledge and expertise of using SIEM technologies for event investigation.
  • Should be familiar with as many of these logging methods and formats as possible: Windows, UNIX, Cisco devices Palo Alto firewalls and various web applications.
  • Must have incident investigation and response skill set
  • Must have knowledge of current threat landscape (threat actors, APT, cyber-crime, etc)
  • Must have knowledge of malware operation and indicators
  • Must have knowledge of DDoS mitigation techniques
  • Must have protocol analysis experience (Wireshark)
  • This position may require eligibility to obtain a US security clearance. (Non-US Citizens may not be eligible)


Bonus Qualification:

  • Should have experience with scripting
  • Should have knowledge of forensic techniques
  • Should have experience in mentoring and training junior analysts

GDLS considers factors such as, scope/responsibilities of the position, candidate experience and education/training background, in addition to local market comparable and business considerations when extending an offer.
Applied = 0

(web-776696b8bf-d9dvp)