Cyber Security Analyst III, DCO Watch Analyst Tier 3 Malware North Charleston, SC Secret Clearance, with ability to obtain TS / SCI Position Description As a Tier 3 Defensive Cyber Operations (DCO) Watch Analyst you will be responsible for leading complex incident response, conducting proactive threat hunting, and enhancing detection capabilities within a Cybersecurity Service Provider (CSSP) environment.
You will oversee incident analysis, coordinate with external entities, and drives purple team activities to strengthen security posture.
This role requires advanced expertise and compliance with CJCSM 6510.01B.
Position Requirements and Duties Analyze and understand the behavior of malware using dynamic and static reverse engineering techniques.
Produce comprehensive technical reports documenting malware capabilities, mitigation strategies, and recommended defensive actions Develop and maintain YARA signatures to identify malware families and variants across enterprise environments at scale.
Lead incident response efforts, including analysis, mitigation, and reporting of significant incidents per CJCSM 6510.01B Manage incident response campaigns by developing strategies, coordinating multi-team efforts, and ensuring comprehensive resolution and reporting Conduct proactive threat hunting to identify advanced threats and vulnerabilities within the network Lead purple team exercises to evaluate and enhance detection and response capabilities in collaboration with red and blue teams Evaluate and refine detection mechanisms, including IDS / IPS signatures and log correlation rules, to improve accuracy and reduce false positives Perform advanced network and host-based digital forensics on Windows and other operating systems to support incident investigations Coordinate with reporting agencies and subscriber sites to ensure comprehensive analysis and reporting of significant incidents Develop and maintain internal SOP documentation, ensuring alignment with CJCSM 6510.01B and other directives Provide 24 / 7 support for incident response during non-core hours, and mentor junior analysts Lead program reviews, product evaluations, and onsite certification evaluations Overtime may be required to support incident response actions (Surge). Operations are conducted 24 / 7 / 365 across three regional operation centers (ROC) Each ROC works four ten-hour shifts (Sunday-Wednesday or Wednesday-Saturday) Shift placement is at the discretion of assigned managers Minimum Qualifications Bachelor’s Degree in relevant discipline and 5 years or at least 8 years of experience working in a CSSP, SOC, or similar environment 2+ years of experience as a Malware Analyst Must be a U.S.
Citizen Desired Qualifications Possess comprehensive knowledge of programming skills :
Employee Assistance Program :
Watch Analyst • North Charleston, SC, US