V2X Inc
Security Operation Center (SOC) Analyst II
3 days ago Be among the first 25 applicants
Get AI-powered advice on this job and more exclusive features.
Security Operation Center (SOC) Analyst II "W-TRS" JRMC Hohenfels, Germany ONSITE Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
A SOC Analyst is responsible for cybersecurity operations, incident response, and defensive cyber measures across both centralized and distributed locations in support of the Warfighter Training Readiness Solutions (W-TRS) program under the U.S. Army PEO STRI. The role involves continuous 24×7×365 monitoring, analysis, and response to cyber threats, ensuring adherence to best practices and operational procedures for defensive cyber operations. The analyst proactively implements defense strategies, maintains compliance and reporting metrics, and ensures alignment with DoD cybersecurity policies. Additionally, they generate reports related to FISMA, RMF ConMon, and security incidents while operating, maintaining, and deploying enterprise cyber tools.
Required Skills
Brings hands-on experience in cybersecurity operations (including protection, detection, response, and sustainment).
Possesses extensive technical expertise in current cybersecurity technologies and emerging innovations.
Demonstrates knowledge of the lifecycle of cybersecurity threats and use of existing TTPs.
Strong written and verbal communication skills, and the ability to create technical reports based on analytical findings.
Responsibilities
Support production of documentation and associated artifacts, the implementation of cybersecurity requirements as identified in DoDI 8510 and AR 25-2 based upon the System Categorization under the Risk Management Framework (RMF).
Operate workstation, and collect, analyze, and assimilate data into usable forms.
Execute incident responses for all incidents involving the system, prepare incident reports, and submit to appropriate IA personnel.
Validate IA Vulnerability Alerts (IAVAs) for supported baselines via vulnerability scanning.
Maintain and secure the current and future baseline.
Ensure all components have a representative security configuration baseline documented.
Conduct continuous monitoring and compliance testing to validate current configurations.
Analyze and correlate audit records using the Security Incident & Event Management (SIEM).
Analyze security requirements, perform functional and security testing, prepare initial RMF documents for system Assessment and Authorization (A&A), and present the security architecture.
Monitor and control communications at external boundaries, including unauthorized software and mobile code.
Notify site IA personnel immediately upon detection of an unauthorized network service.
Configure and enable required security features.
Review, analyze, correlate, and store audit records from multiple components using SIEM tools and monitoring capabilities.
Perform necessary auditing and audit review.
Perform account management and monitor accounts.
Ensure backups of audit logs are performed weekly.
Support execution of annual FISMA requirements according to Assessment and Authorization (A&A) and ATO requirements.
Desired Skills
3+ years of incident handling experience.
Experience working with DoD / U.S. Army / Federal Government.
Experience with software/tools: ACAS, Splunk, Endpoint Security Solution (ESS), Cisco ASA Firewalls and Firepower IPS, SRGs, STIGS, DISA STIG Viewer, SCC/SCAP, Evaluate STIG, Windows, Linux (RHEL).
Experience as a SOC Analyst I or related cyber position under CSSP.
Desired Certification: CYSA+* or other CSSP certifications.
Education Requirements Bachelor's degree in Cybersecurity and Information Assurance; Advanced degree(s) preferred.
Experience Requirements Bachelor's degree + 6 years of relevant experience, Master’s degree + 6 years of relevant experience.
Clearance Requirements Current U.S. DoD Secret Clearance.
V2X is committed to building a diverse and inclusive environment in which we recognize and value each other’s differences as well as fostering a culture that promotes its core values: Professionalism, Integrity, and Respect. As an equal opportunity employer, all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, genetic information, national origin, age, disability, or status as a protected veteran.
#J-18808-Ljbffr
Get AI-powered advice on this job and more exclusive features.
Security Operation Center (SOC) Analyst II "W-TRS" JRMC Hohenfels, Germany ONSITE Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
A SOC Analyst is responsible for cybersecurity operations, incident response, and defensive cyber measures across both centralized and distributed locations in support of the Warfighter Training Readiness Solutions (W-TRS) program under the U.S. Army PEO STRI. The role involves continuous 24×7×365 monitoring, analysis, and response to cyber threats, ensuring adherence to best practices and operational procedures for defensive cyber operations. The analyst proactively implements defense strategies, maintains compliance and reporting metrics, and ensures alignment with DoD cybersecurity policies. Additionally, they generate reports related to FISMA, RMF ConMon, and security incidents while operating, maintaining, and deploying enterprise cyber tools.
Required Skills
Brings hands-on experience in cybersecurity operations (including protection, detection, response, and sustainment).
Possesses extensive technical expertise in current cybersecurity technologies and emerging innovations.
Demonstrates knowledge of the lifecycle of cybersecurity threats and use of existing TTPs.
Strong written and verbal communication skills, and the ability to create technical reports based on analytical findings.
Responsibilities
Support production of documentation and associated artifacts, the implementation of cybersecurity requirements as identified in DoDI 8510 and AR 25-2 based upon the System Categorization under the Risk Management Framework (RMF).
Operate workstation, and collect, analyze, and assimilate data into usable forms.
Execute incident responses for all incidents involving the system, prepare incident reports, and submit to appropriate IA personnel.
Validate IA Vulnerability Alerts (IAVAs) for supported baselines via vulnerability scanning.
Maintain and secure the current and future baseline.
Ensure all components have a representative security configuration baseline documented.
Conduct continuous monitoring and compliance testing to validate current configurations.
Analyze and correlate audit records using the Security Incident & Event Management (SIEM).
Analyze security requirements, perform functional and security testing, prepare initial RMF documents for system Assessment and Authorization (A&A), and present the security architecture.
Monitor and control communications at external boundaries, including unauthorized software and mobile code.
Notify site IA personnel immediately upon detection of an unauthorized network service.
Configure and enable required security features.
Review, analyze, correlate, and store audit records from multiple components using SIEM tools and monitoring capabilities.
Perform necessary auditing and audit review.
Perform account management and monitor accounts.
Ensure backups of audit logs are performed weekly.
Support execution of annual FISMA requirements according to Assessment and Authorization (A&A) and ATO requirements.
Desired Skills
3+ years of incident handling experience.
Experience working with DoD / U.S. Army / Federal Government.
Experience with software/tools: ACAS, Splunk, Endpoint Security Solution (ESS), Cisco ASA Firewalls and Firepower IPS, SRGs, STIGS, DISA STIG Viewer, SCC/SCAP, Evaluate STIG, Windows, Linux (RHEL).
Experience as a SOC Analyst I or related cyber position under CSSP.
Desired Certification: CYSA+* or other CSSP certifications.
Education Requirements Bachelor's degree in Cybersecurity and Information Assurance; Advanced degree(s) preferred.
Experience Requirements Bachelor's degree + 6 years of relevant experience, Master’s degree + 6 years of relevant experience.
Clearance Requirements Current U.S. DoD Secret Clearance.
V2X is committed to building a diverse and inclusive environment in which we recognize and value each other’s differences as well as fostering a culture that promotes its core values: Professionalism, Integrity, and Respect. As an equal opportunity employer, all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, genetic information, national origin, age, disability, or status as a protected veteran.
#J-18808-Ljbffr