Sr. Cyber Security Analyst - Top Secret Clearance; SCI Eligible
Listed on 2025-12-24
-
IT/Tech
Cybersecurity, Network Security
Sr. Cyber Security Analyst - Top Secret Clearance (SCI Eligible)
With more than twenty years of securing some of the U.S. Department of Defense and the Intelligence Community’s most critical networks, JFL Consulting, LLC provides advanced network security solutions to a range of U.S. Government and U.S. commercial clients. Our cybersecurity operators are experts at assessing and defending mission‑critical data and the networks that facilitate their operation. We are focused on delivering advanced products and industry best practices that meet each customer’s unique requirements.
Visit
JFL Consulting, LLC is seeking a Senior Cyber Security Operator to support critical cybersecurity operations within highly secure environments. This role offers the opportunity to work on advanced network defense strategies, with a unique focus on passive vulnerability analysis: a specialized and low‑impact method of identifying risks without active scanning. You’ll play a key role in detecting anomalies, analyzing complex systems, and strengthening network security for high‑value missions.
This position is ideal for professionals who enjoy deep technical work, problem‑solving, and contributing to meaningful national security efforts within a collaborative, mission‑driven team.
Senior Cyber Security Operator
Place of PerformancePearl Harbor, HI 96701
Mandatory RequirementsTop Secret Clearance (SCI Eligible)
Experience LevelSenior‑Level (8+ years in cybersecurity, 3+ years in passive vulnerability analysis)
Responsibilities- Ensure the safe and proper functional operation of the toolkit and its components.
- Collect and document measures of performance per approved CONOPS.
- Analyze and document behaviors, characteristics, and attributes of a network’s baseline activity within steady‑state operations.
- Analyze and investigate potential anomalies or outliers from established baseline.
- Analyze and identify misconfigurations, faults, and vulnerabilities within the network’s architecture, subcomponents, and utilized communication protocols.
- Determine root source of anomalies and extent of vulnerable findings for validation with system users and administrators.
- Document and report anomalies to appropriate channels for further investigation and notification.
- Document vulnerable findings and provide recommendations through appropriate channels that increase both security and operational capacity of the respective network.
- Recommend improvements to current operations for potential incorporation into the overall program.
- Collaborate with cross‑functional teams to support incident response, system hardening, and policy development as needed.
- Additional duties as assigned.
- 5‑10% CONUS Travel.
- Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, or a related field preferred. Equivalent work experience may be considered in lieu of a degree.
- Master’s degree is a plus.
- Must hold an IAT Level II certification (e.g., Security+, CySA+, CCNA Security, GSEC).
- Must hold a CSSP Analyst certification (e.g., CEH, CySA+, GCIA, GCIH).
- Preferred:
Advanced certifications such as CISSP, OSCP, or similar.
- Minimum 8 years in cybersecurity operations or analysis.
- Minimum 3 years of experience with passive vulnerability detection techniques.
- Experience supporting DoD or Intelligence Community networks.
- Practical experience with firewalls, network TAPs, IDS/IPS, endpoint protection, and other network defense technologies.
- Adept at evaluating network protocols utilizing network analyzers such as Wireshark, Tshark, and tcpdump.
- Experienced in analyzing network datasets, including Zeek and firewall logs, to support threat hunting and security investigations.
- Experienced in leveraging data analysis platforms such as Splunk, Kibana, and Arkime to detect and analyze anomalous network activity.
- Proficient in triaging Suricata alerts, tuning rules, and creating custom detections.
- In‑depth understanding of network vulnerabilities and misconfigurations.
- Strong knowledge of cybersecurity principles, adversary techniques, and detection/response strategies.
- Experience working within the…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).