Minimum experience

Demonstrated knowledge of cybersecurity principles, practices, and technologies, with a focus on threat intelligence, network monitoring, incident detection, and malware protection.

minimum education

A bachelor’s degree in Cybersecurity, Information Security, Computer Science, or a related field


We provide a comprehensive compensation package, including a range of benefits to support our employees’ well-being and professional growth.

The salary range for this position is between $53,171 and $112,888, reflecting our commitment to rewarding expertise and performance.


Pasadena, California

functional description

Team members will support Tier 1 and 2 Operations with direct mentorship from JPL Cybersecurity Engineering and Operations Leads. The team will manage and support day-to-day operations with direct customer interface across a 24/5 schedule with weekends and holidays off.

  • Collect and analyze data on cyber threat landscape to develop actionable, technical threat intelligence; drive informed, risk-based decision-making
  • Maintain awareness of JPL network traffic conditions, performance, bandwidth indicators, anomaly alerts, unauthorized activity, audit logs, and any on-going cyber event or incident.
  • Identify and document unauthorized activity and/or attacks to include source/destination addresses and ports, attack vector (e.g., network intrusion, web- based, etc.), and attack imeframe.
  • Conduct Malware Protection (MP) activities including, but not limited to, network monitoring and/or host-based security, malware incidents, and malware detection signature currency.

Certifications / Other

Relevant industry certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or similar are preferred

additional required knowledge and skills


  • Proficiency in understanding cyber threat landscapes, attack vectors, and the tactics, techniques, and procedures (TTPs) of cyber adversaries.
  • Experience in monitoring network traffic, analyzing logs, and identifying unauthorized activities or attacks. Ability to document and report incidents, including source/destination addresses, attack vectors, and timelines.
  • Familiarity with malware protection practices, including network and host-based security, malware incident response, and maintaining up-to-date malware detection signatures.
  • Working knowledge of cybersecurity tools and technologies used for threat detection, network monitoring, and incident response, such as SIEM (Security Information and Event Management) systems, intrusion detection systems (IDS), and endpoint protection solutions.
  • Strong analytical skills to collect, analyze, and interpret data related to cyber threats, incidents, and vulnerabilities.
  • Ability to assess risks based on threat intelligence and contribute to risk-based decision-making processes.
  • Effective communication and teamwork skills to collaborate with cross-functional teams, including Cybersecurity Engineering and Operations Leads.

Preferred Requirements:

  • Previous experience in a cybersecurity role, preferably in a Security Operations Center (SOC) environment, with hands-on experience in threat monitoring, incident response, and malware protection.
  • Industry-recognized cybersecurity certifications.
  • Familiarity with collecting, analyzing, and disseminating technical threat intelligence to inform risk assessments and incident response strategies.
  • Proficiency in using SIEM (Security Information and Event Management) systems for log analysis, incident detection, and correlation of security events.
  • Understanding of network protocols, architectures, and traffic analysis for identifying anomalies and potential threats.
  • Demonstrated commitment to staying up-to-date with the latest cybersecurity trends, threats, and best practices through continuous learning and professional development.

other details

Veterans Highly Desired

Candidate must be US citizen (or be able to prove the right to work in the US for an extended period of time).

Must successfully pass a background check as a condition of employment; based on security clearance level required.

EEO statement: Concordant is an equal-opportunity employer. All employment opportunities are provided without regard to race, religion, sex (including sexual orientation and gender identity), marital status, pregnancy, childbirth or related medical conditions, national origin, age, veteran status, disability, genetic information, or any other characteristic protected by law.