×
Register Here to Apply for Jobs or Post Jobs. X

Sr. Cyber Security Analyst - Top Secret Clearance; SCI Eligible

Job in Pearl City, Honolulu County, Hawaii, 96782, USA
Listing for: Jfl Consulting
Full Time position
Listed on 2026-01-04
Job specializations:
  • IT/Tech
    Cybersecurity, Network Security
Job Description & How to Apply Below
Position: Sr. Cyber Security Analyst - Top Secret Clearance (SCI Eligible)

Full-time

Description

With more than twenty years of securing some of the U.S. Department of Defense and the Intelligence Community’s most critical networks, JFL Consulting, LLC provides advanced network security solutions to a range of US Government and US commercial clients. Our cybersecurity operators are experts at assessing and defending mission‑critical data and the networks that facilitate their operation. We are focused on delivering advanced products and industry best practices that meet each customer’s unique requirements.

Visit

Job Description

JFL Consulting, LLC is seeking a Senior Cyber Security Operator to support critical cybersecurity operations within highly secure environments. This role offers the opportunity to work on advanced network defense strategies, with a unique focus on passive vulnerability analysis : a specialized and low‑impact method of identifying risks without active scanning. You’ll play a key role in detecting anomalies, analyzing complex systems, and strengthening network security for high‑value missions.

This position is ideal for professionals who enjoy deep technical work, problem‑solving, and contributing to meaningful national security efforts within a collaborative, mission‑driven team.

Job Title:

Senior Cyber Security Operator

Place of Performance:
Pearl Harbor HI, 96701

Mandatory Requirements

Top Secret Clearance (SCI Eligible)

Experience Level

Senior‑Level (8+ years in cybersecurity, 3+ years in passive vulnerability analysis)

Responsibilities
  • Ensure the safe and proper functional operation of the toolkit and its components.
  • Collect and document measures of performance per approved CONOPS.
  • Analyze and document behaviors, characteristics, and attributes of a network’s baseline activity within steady‑state operations.
  • Analyze and investigate potential anomalies or outliers from established baseline.
  • Analyze and identify misconfigurations, faults, and vulnerabilities within the network’s architecture, subcomponents, and utilized communication protocols.
  • Determine root source of anomalies and extent of vulnerable findings for validation with system users and administrators.
  • Document and report anomalies to appropriate channels for further investigation and notification.
  • Document vulnerable findings and provide recommendations through appropriate channels that increase both security and operational capacity of the respective network.
  • Recommend improvements to current operations for potential incorporation into the overall program.
  • Collaborate with cross‑functional teams to support incident response, system hardening, and policy development as needed.
  • Additional duties as assigned
  • 5‑10% CONUS Travel
Requirements Education
  • Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, or a related field preferred. Equivalent work experience may be considered in lieu of a degree.
  • A master’s degree is a plus.
Certifications
  • Must hold an IAT Level II certification as defined and described in DoDD 8570.01, 8570.01‑M, and 8140.01‑03, and as amended. (e.g., Security+ CE, CySA+, CCNA Security, GSEC).
  • Must hold a CSSP Analyst certification as defined and described in DoDD 8570.01, 8570.01‑M, and 8140.01‑03, and as amended. (e.g., CEH, CySA+, GCIA, GCIH).
  • Preferred:
    Advanced certifications such as CISSP (Certified Information Systems Security Professional), OSCP (Offensive Security Certified Professional), or similar.
Experience
  • Minimum 8 years in cybersecurity operations or analysis
  • Minimum 3 years of experience with passive vulnerability detection techniques
  • Experience supporting DoD or Intelligence Community networks
Technical Skills
  • Practical experience with firewalls, network TAPs, IDS / IPS, endpoint protection, and other network defense technologies
  • Adept in evaluating network protocols utilizing network analyzers, such as Wireshark, Tshark, and tcpdump
  • Experienced in analyzing network datasets, including Zeek and firewall logs, to support threat hunting and security investigations.
  • Experienced in leveraging data analysis platforms, such as Splunk, Kibana, and Arkime, to detect and analyze anomalous network activity
  • Proficient in triaging Suricata alerts, tuning rules, and…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary