Defensive Cyber Operations Analyst
Summit Technologies & Solutions, Inc.
Contract
Vandenberg AFB, CA
Job description
The Threat Detection & Response Analyst will lead daily operations across warehouse, shipping, and delivery functions while managing a team of 20–40 employees. This role ensures efficiency, safety, and customer satisfaction, while supporting company goals through strategic planning and execution.
We're looking for someone who
● Holds a bachelor’s degree in Computer Science, Information Security, or a related field
(Master’s degree preferred)
● Has 5+ years of hands-on experience in a SOC, threat detection, or incident response role
● Demonstrates strong expertise in threat analysis, incident investigation, and response
workflows
● Understands enterprise log sources including Windows/Linux servers, network devices,
endpoints, and cloud platforms
● Has experience triaging and investigating alerts across complex, multi-platform
environments
● Is familiar with cloud environments such as AWS or Azure and cloud-native
logging/security services
● Possesses knowledge of detection engineering, correlation logic, MITRE ATT&CK
techniques, and SOC best practices
● Communicates technical findings clearly to both technical and non-technical stakeholders
● Thrives in diverse, global environments and demonstrates adaptability and professionalism
● Brings a curious, resilient, and data-driven mindset with a passion for continuous learning
and threat research
● Holds relevant certifications such as CompTIA Security+, CISSP, Pentest+, or similar
(preferred)
● Can physically lift at least 20lbs
What you'll do
● Monitor, triage, and investigate security alerts across SIEM, EDR, network, endpoint, and
cloud environments
● Analyze logs from firewalls, IDS/IPS, endpoint platforms, operating systems, and cloud
services to identify malicious activity
● Perform incident analysis to determine scope, impact, and root cause, and recommend
containment and remediation actions
● Escalate confirmed incidents and support end-to-end response efforts in coordination with
IT and infrastructure teams
● Design, tune, and optimize detection logic, dashboards, and alerting use cases to improve
operational efficiency
● Ensure log ingestion health, completeness, and fidelity across enterprise systems
● Onboard and validate new log sources, including parsing, normalization, and field
extraction
● Conduct proactive threat hunting to identify advanced or evasive threats
● Monitor for anomalies such as lateral movement, privilege abuse, and data exfiltration
attempts
● Prioritize vulnerabilities based on threat context, asset criticality, and business impact
● Track remediation efforts, validate fixes, and reduce recurring risk
● Improve detection coverage, playbooks, and SOC workflows based on lessons learned
● Maintain clear documentation for detection use cases, triage procedures, and operational
standards
● Collaborate cross-functionally to ensure rapid and effective incident response
Job Type: Contract
Pay: $80.00 - $85.00 per hour
Expected hours: 40 per week
Work Location: In person