Security Operations Analyst - Growing Maritime Defense Business.

St. Petersburg, Florida, United States

Applications have closed

Pole Star Defense

At Pole Star Space Defense, we engineer and integrate multiple types of data, and capabilities to meet government requirements. We create and deliver new technologies to provide the best in maritime domain awareness.

View company page

About The Company:

Pole Star Defense is a leading provider of maritime domain awareness, maritime security, and fisheries monitoring systems to the government sector. Since 1998, we have pushed the limits of innovation, mitigating growing threats to ships, supply chains, cargo, territorial waters and, most importantly, safety of lives at sea and beyond. Today, we continue to develop and implement pioneering intelligence technologies to protect customer vessels, people, maritime domain, and reputation.

Position Description:

Pole Star Defense’s Security Analyst role is a strategic position centered on vulnerability management, with an emphasis on integrating cloud security, network security, and broader security operations. This professional will be pivotal in conducting comprehensive vulnerability assessments across our network and cloud environments, identifying, analyzing, and mitigating potential security weaknesses. The role extends to collaborating with the IT security team and other departments to enhance our defensive posture through rigorous security testing and alignment with industry best practices.


  • Conducting vulnerability assessments to identify and evaluate potential security risks in both cloud and on-prem environments.
  • Implementing and managing security measures to protect systems from vulnerabilities, ensuring defenses are up to date.
  • Working with IT and cybersecurity teams to ensure security strategies are integrated and effective across all platforms.
  • Regularly monitoring security advisories, alerts, and industry trends to address potential threats before they impact the organization.
  • Assisting in developing and maintaining security policies, procedures, and best practices to support an effective vulnerability management strategy.
  • Participating in incident response activities, including investigating, documenting, and resolving security incidents, and analyzing incidents to prevent future occurrences.
  • Providing security advice and guidance to organizational stakeholders to promote security awareness and best practices.
  • Being adaptable to take on additional responsibilities within the security team as needed.
  • Cross-training in other cybersecurity areas to ensure a well-rounded understanding and effective support of the team.


  • Good understanding of cloud security practices and on-prem security systems.
  • Knowledge of cybersecurity frameworks and compliance standards.
  • Experience with vulnerability management tools and practices.
  • Strong analytical and problem-solving abilities.
  • Effective communication skills.


  • Bachelor's Degree in Computer Science, Information Technology, or a related field, or equivalent experience.
  • CompTIA CySA+ (or obtained within 6 months)
  • Must be willing to obtain additional security certifications as required by role, or via DoD requirements.

Desired Skills: (Note Mandatory)

  • Experience working with DHS or DoD
  • Ability to obtain and maintain a Security Clearance


  • Ability for up to 10% travel both domestic and international.


Pole Star Defense offers benefits that are designed to lead an evolving marketplace and encourage below: a healthy balance between work and life. Highlights of those benefits are listed

  • Medical, Vision, and Dental insurance for employees and dependents (100% covered by the Company)
  • Life and Disability insurance, Company funded
  • 20 days annual leave (can buy or sell more days)
  • 5 wellness days
  • Up to a 5% 401k matching
  • Gym membership subsidy
  • Volunteer Day PTO
  • Refer-a-friend recruitment bonus

*This job description may not be inclusive of all assigned duties, responsibilities, or aspects of the job described, and may be amended at the sole discretion of the Employer*


While this position is scheduled for a traditional Monday – Friday work week, our systems run 24/7/365 and as such, you may be expected to perform out of hours, on-call support on an as needed basis. Additional compensation may be available for working on-call, standby or holiday hours.

This is a Public Trust position and requires completion of a State and Federal Criminal History Report (i.e., background check) and may require a Department of Defense security clearance. Current and future employment will be contingent upon satisfactory completion of both the FBI Summary History Report and if designated, a DoD security clearance.

This position requires use of or access to information subject to the Export Administration Regulations (“EAR”) or the International Traffic in Arms Regulations (“ITAR”). Accordingly, all applicants must be U.S. persons within the meaning of these regulations. Under ITAR, a U.S. person is defined as a U.S. Citizen, U.S. Permanent Resident, or a person who is a protected individual under the immigration and Naturalization Act (8 U.S.C. 1324b(a)(3)).

Pole Star Defense is a U.S. Government contractor and is an Equal Opportunity Employer including disability and veterans.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: C Clearance Cloud Compliance CompTIA Computer Science DoD Incident response Monitoring Network security Security Clearance Strategy Vulnerabilities Vulnerability management

Perks/benefits: Fitness / gym Health care Insurance Medical leave Salary bonus

Region: North America
Country: United States
Job stats:  0  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.