Cyber Security Analyst III DCO Watch Analyst Tier 3 Malware
North Charleston SC
Secret Clearance with ability to obtain TS / SCI
Position Description
As a Tier 3 Defensive Cyber Operations (DCO) Watch Analyst you will be responsible for leading complex incident response conducting proactive threat hunting and enhancing detection capabilities within a Cybersecurity Service Provider (CSSP) environment. You will oversee incident analysis coordinate with external entities and drives purple team activities to strengthen security posture. This role requires advanced expertise and compliance with CJCSM 6510.01B.
Position Requirements and Duties
- Analyze and understand the behavior of malware using dynamic and static reverse engineering techniques.
- Produce comprehensive technical reports documenting malware capabilities mitigation strategies and recommended defensive actions
- Develop and maintain YARA signatures to identify malware families and variants across enterprise environments at scale.
- Lead incident response efforts including analysis mitigation and reporting of significant incidents per CJCSM 6510.01B
- Manage incident response campaigns by developing strategies coordinating multi-team efforts and ensuring comprehensive resolution and reporting
- Conduct proactive threat hunting to identify advanced threats and vulnerabilities within the network
- Lead purple team exercises to evaluate and enhance detection and response capabilities in collaboration with red and blue teams
- Evaluate and refine detection mechanisms including IDS / IPS signatures and log correlation rules to improve accuracy and reduce false positives
- Perform advanced network and host-based digital forensics on Windows and other operating systems to support incident investigations
- Coordinate with reporting agencies and subscriber sites to ensure comprehensive analysis and reporting of significant incidents
- Develop and maintain internal SOP documentation ensuring alignment with CJCSM 6510.01B and other directives
- Provide 24 / 7 support for incident response during non-core hours and mentor junior analysts
- Lead program reviews product evaluations and onsite certification evaluations
- Overtime may be required to support incident response actions (Surge).
- Operations are conducted 24 / 7 / 365 across three regional operation centers (ROC)
- Each ROC works four ten-hour shifts (Sunday-Wednesday or Wednesday-Saturday)
- Shift placement is at the discretion of assigned managers
Minimum Qualifications
Bachelors Degree in relevant discipline and 5 years or at least 8 years of experience working in a CSSP SOC or similar environment2 years of experience as a Malware AnalystMust be a U.S. CitizenDesired Qualifications
Possess comprehensive knowledge of programming skills : including C / C Assembly language Windows APIs Golang Rust exploit development and related disciplines.Extensive knowledge in the use of decompilers debuggers and other standard malware analysis toolsProficiency with kernel and user-mode debugging techniques.Deep knowledge of obfuscation anti-analysis and detection evasion methodsComprehensive knowledge of CJCSM 6510.01BDeep expertise in IDS / IPS solutions including signature development and optimizationExtensive experience with Digital Forensics across multiple operating systemsDemonstrated expert-level knowledge of Incident Response ProceduresAdvanced proficiency with host-based tools and operating system loggingExpertise in log aggregation tools (e.g. Splunk Elastic Sentinel) for complex correlation analysisExceptional logical thinking and analytical abilitySuperior verbal and written communication skillsProven ability to solve complex problems independentlyRequired Certifications
Must have requisite certifications to fulfill DoD 8570 IAT Level II and CSSP-specific requirementsCompany Overview
Adapt Forward is a cybersecurity solutions provider for some of the nations most valuable information systems. Leveraging advanced threat assessment technology and experience in building high-level information security infrastructure we develop adaptive solutions uniquely tailored to our customers business objectives to protect sensitive data against sophisticated threats in an increasingly complex security environment.
Summary of Benefits
Comprehensive Physical Wellness Package including Medical Dental Vision Care plus Flexible Spending Accounts for health- and dependent-care are included in our standard benefits plan.401k Retirement Plan with Matching Contribution is immediately available and vested.Annual Training Budget to be used for conference attendance school enrollment certification programs and associated travel expenses.Eleven Federal Holidays plus three weeks of PTO / vacation / sick leave that accrues at a rate of ten hours per month.Employee Assistance Program : Counseling / legal assistance and other employee well-being programs are also offered.Equal opportunity employer as to all protected groups including protected veterans and individuals with disabilities.
Adapt Forwards Veteran / Disability Affirmative Action Plan narrative section is available for inspection upon request during normal business hours at the Human Resources office and may be requested by contacting Human Resources at
Required Experience :
Senior IC
Key Skills
ArcGIS,Intelligence Community Experience,GIS,Python,Computer Networking,Data Collection,Intelligence Experience,R,Relational Databases,Analysis Skills,Data Management,Application Development
Employment Type : Full-Time
Experience : years
Vacancy : 1