Cyber Operations Analyst
Fort Meade, Maryland
Job Id:
161232
Job Category:
Job Location:
Fort Meade, Maryland
Security Clearance:
TS/SCI
Business Unit:
Zachary Piper
Division:
Zachary Piper Solutions
Position Owner:
Cameron Bagwell
*Active TS/SCI clearance needed for consideration, as well as willingness to sit for a CI Polygraph*
Zachary Piper Solutions is currently seeking a Cyber Operations Analyst to support the DISA DCDC (DoD Cyber Defense Command) based onsite at Fort Meade, MD. This is a full‑time, fully onsite role supporting a high‑intensity operations center focused on network operations and cyber defense for DISA in support of the DoD and COCOMs. This position is critical in safeguarding enterprise‑scale networks and assets. As a Cyber Operations Analyst, you will provide technical stability, enterprise defensive strategies, cyber situational awareness, and senior‑level analytic support to mission leadership.
Responsibilities:
- Provide holistic enterprise defensive strategies for cybersecurity capabilities within the DODIN, including Cloud, boundary security, cross‑domain solutions, and endpoint technologies.
- Analyze architectures, technologies, policies, and operational data to identify prevention opportunities, detect anomalies, and mitigate vulnerabilities or inefficiencies.
- Prepare and deliver briefings appropriate for senior leadership, including general and flag officers.
- Conduct cyber situational awareness activities and provide analysis and recommendations for enhancing SA capabilities.
- Deliver enterprise‑wide cybersecurity, threat analysis, and defensive strategies across Cloud, regional gateways, cross‑domain peering points, IAPs, and multi‑tier endpoints.
- Lead complex security incident responses, including threat actor identification, lateral movement analysis, and event log interpretation.
- Perform PCAP and netflow analysis, SIEM‑based investigation (e.g., Splunk), and rule analysis (Snort/Defender).
- Engage daily with mission teams to meet operational requirements and secure both cloud and on‑prem environments.
- Triage and resolve cyber events and incidents under high‑tempo operational conditions.
- Utilize technical expertise, military process knowledge, and communication skills to support challenging operational requirements.
Requirements:
- Bachelor’s degree in a relevant technical discipline and 8+ years of related experience
- Active DoD TS/SCI clearance, eligible for CI Polygraph
- DoD 8570 IAT Level II certification, including Security+ CE
- Experience working within a Joint Command and/or Operations Center
- Strong understanding of military orders and the military decision‑making process
- Proficient with Windows Desktop (7–10) and knowledgeable of Windows Server (2003, 2008, 2012 R2)
- Ability to operate in virtual collaboration environments (e.g., Microsoft Teams)
- Proficiency with Microsoft Office (Word, Excel, Access, Outlook) and Office 365
- Knowledge of policy development and maintenance
- Strong communication and interpersonal skills for high‑stress environments
- Solid understanding of IP addressing and subnetting
- Familiarity with network monitoring protocols
- Knowledge of Microsoft Server OS, VMWare, and Cisco network devices
Compensation Includes:
- Salary Range: $120,000 - $180,000 (depending on experience)
- Full Benefits: Medical, Dental, Vision, 401(k), PTO, and Sick Leave as required by law
This job posting opens on 3/3/2026 and will remain open for at least 30 days from the posting date
#LI-CB1
#LI-ONSITE
Keywords: packet capture, cyber analyst, soc analyst, cyber engineer, top secret, TS/SCI, IDS, DoD networks, windows, Security+, active directory, CompTIA, troubleshooting, monitoring, end user support, red hat, linux, shell, scripting, CLI, VMware, ansible, top secret, intelligence community, intel, TS/SCI, information technology, infrastructure, systems engineer, administrator, windows, active directory, client, LDAP, CI Poly, counterintelligence, Fidelis, Security+ CE, CCNA-Security, GSEC, SSCP, CySA+, GICSP, CND, Windows, UNIX, Linux, Host-based Security System, Endpoint Security Suite (ESS), Splunk, Cribl, network security tools, intrusion detection systems, IDS, snort, suricata, corelight, intrustion prevention systems, IPS, Cybersecurity, Incident Response, Splunk, SPL, Packet Capture, Wireshark, Network Forensics, Threat Hunting, Intrusion Detection, Log Analysis, SIEM, Malware Analysis, Network Traffic Analysis, Forensic Analysis, Threat Intelligence, SOC, Vulnerability Assessment, IDS/IPS, PCAP Analysis, Network Security, Anomaly Detection, EDR, Cyber Threats, Threat Mitigation, Digital Forensics, APT, Insider Threat, Security Policies, Compliance, Security Architecture, NSM, Security Risk Assessment, TIP, Security Analytics