We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Cyber Ops Specialist

Orbis Operations
United States, Virginia, McLean
6849 Old Dominion Drive (Show on map)
Mar 18, 2026

Cyber Ops Specialist

This is a proposal requisition. Work will begin only if the contract is awarded.

Orbis is looking for a Cyber Ops Specialist to support critical mission operations in the Washington Metro Area. The role monitors, detects, analyzes, and responds to cyber threats across enterprise networks and mission systems, safeguarding data, infrastructure, and operations in alignment with Mission Center objectives.

Duties/Responsibilities

* Continuously monitor network, host, and cloud telemetry (e.g., logs, flows, alerts) to detect anomalies and potential security incidents.

* Identify, triage, and escalate events; distinguish true positives from benign activity; coordinate with incident responders and stakeholders.

* Conduct analysis to isolate indicators of compromise (IOCs), tactics/techniques/procedures (TTPs), and likely avenues of attack; document findings and recommended actions.

* Perform threat hunting using security-relevant data to uncover trends, patterns, and correlations indicative of adversary activity.

* Support vulnerability assessments and identify single points of failure; recommend mitigations to improve resilience and defense-in-depth.

* Assist with requirements development and the integration, testing, verification, and validation of cyber monitoring and defensive capabilities in lab and operational environments.

* Review technical reports/white papers and feasibility studies for operational relevance and technical soundness; contribute to CONOPs, SOPs, and playbooks.

* Prepare clear, concise briefings and reports that articulate an event's history, status, and operational impact in accordance with the incident response plan.

* Collaborate with Systems Engineers, System Integrators, mission engineering teams, and Government stakeholders to align detection and response with mission priorities.

Work Schedule

Position may require rotating shift coverage to support 24/7 operations, including nights, weekends, and holidays; shift differential may apply per company policy.

Supervisory Responsibilities

This position has no supervisory responsibilities.

Required Education and Experience

* Bachelor's degree in cybersecurity, computer science, information systems, engineering, or a related field; an additional 4 years of relevant experience may substitute for a degree.

* 5+ years of hands-on cyber defense, SOC, incident response, or threat hunting experience in enterprise or mission environments.

* Experience analyzing security telemetry and conducting event triage, IOC development, and incident documentation.

* Experience supporting integration and testing of defensive cyber capabilities (e.g., sensors, logging, or analytics pipelines).

Preferred Education and Experience (not required to apply)

* Master's degree in a relevant technical field.

* 8-10+ years of cyber operations or incident response experience supporting mission-focused environments.

* Experience with feasibility reviews, trade studies, vulnerability assessments, or architecture evaluations.

* Exposure to field operations, deployed systems, or operational test environments.

Required Education and Experience

* U.S. Citizenship.

* Active TS/SCI with Polygraph security clearance.

* Understanding of cybersecurity principles and threat analysis methodologies; ability to correlate data from multiple sources.

* Strong analytical and problem-solving skills; ability to work independently and within multidisciplinary teams.

* Excellent written and verbal communication skills; ability to produce clear technical documentation and brief diverse audiences.

Preferred Skills & Abilities

* Experience developing or refining incident response playbooks, CONOPs, and SOPs.

* Experience identifying single points of failure and recommending mitigations across networked systems.

* Familiarity with forensics triage, malware analysis coordination, or red/blue team operations.

* Proficiency with common defensive tools and data types (e.g., SIEM, endpoint telemetry, network sensors, system/event logs).

Physical Requirements

* Prolonged periods working at a computer; routine video conferences and/or in-person meetings.

* Ability to attend planned meetings across the Washington Metro Area.

* Work may be performed in classified environments per Sponsor direction.

We are an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, disability, or protected veteran status.

Applied = 0

(web-bd9584865-7clgh)