CareerZen Logo
Company logo

Defensive Cyber Operations Analyst

Summit Technologies & Solutions, Inc.

Contract

Vandenberg AFB, CA

Job description

The Threat Detection & Response Analyst will lead daily operations across warehouse, shipping, and delivery functions while managing a team of 20–40 employees. This role ensures efficiency, safety, and customer satisfaction, while supporting company goals through strategic planning and execution.

We're looking for someone who

● Holds a bachelor’s degree in Computer Science, Information Security, or a related field

(Master’s degree preferred)

● Has 5+ years of hands-on experience in a SOC, threat detection, or incident response role

● Demonstrates strong expertise in threat analysis, incident investigation, and response

workflows

● Understands enterprise log sources including Windows/Linux servers, network devices,

endpoints, and cloud platforms

● Has experience triaging and investigating alerts across complex, multi-platform

environments

● Is familiar with cloud environments such as AWS or Azure and cloud-native

logging/security services

● Possesses knowledge of detection engineering, correlation logic, MITRE ATT&CK

techniques, and SOC best practices

● Communicates technical findings clearly to both technical and non-technical stakeholders

● Thrives in diverse, global environments and demonstrates adaptability and professionalism

● Brings a curious, resilient, and data-driven mindset with a passion for continuous learning

and threat research

● Holds relevant certifications such as CompTIA Security+, CISSP, Pentest+, or similar

(preferred)

● Can physically lift at least 20lbs

What you'll do

● Monitor, triage, and investigate security alerts across SIEM, EDR, network, endpoint, and

cloud environments

● Analyze logs from firewalls, IDS/IPS, endpoint platforms, operating systems, and cloud

services to identify malicious activity

● Perform incident analysis to determine scope, impact, and root cause, and recommend

containment and remediation actions

● Escalate confirmed incidents and support end-to-end response efforts in coordination with

IT and infrastructure teams

● Design, tune, and optimize detection logic, dashboards, and alerting use cases to improve

operational efficiency

● Ensure log ingestion health, completeness, and fidelity across enterprise systems

● Onboard and validate new log sources, including parsing, normalization, and field

extraction

● Conduct proactive threat hunting to identify advanced or evasive threats

● Monitor for anomalies such as lateral movement, privilege abuse, and data exfiltration

attempts

● Prioritize vulnerabilities based on threat context, asset criticality, and business impact

● Track remediation efforts, validate fixes, and reduce recurring risk

● Improve detection coverage, playbooks, and SOC workflows based on lessons learned

● Maintain clear documentation for detection use cases, triage procedures, and operational

standards

● Collaborate cross-functionally to ensure rapid and effective incident response

Job Type: Contract

Pay: $80.00 - $85.00 per hour

Expected hours: 40 per week

Work Location: In person