General Dynamics Electric Boat

EBIT Technology Operations Center (TOC) Analyst

Requisition ID
2025-16462
Location
US-CT-Groton
Seat Location
EB Poheganut
Trade
Information Technology
Shift
1st
Security Clearance Required
Secret
Number of Openings
3

Overview

Electric Boat Information Technology (EB IT) is responsible for Electric Boat's enterprise and special use information systems, such as product design environments, collaboration platforms, and office productivity suites. EBIT supports over 20,000 end-users in a wide variety of work environments, networks and locations.

 

The EBIT Technology Operations Center (TOC) Analyst serves as the front-line guardian of enterprise technology systems, monitoring critical IT infrastructure and cloud environments in real-time. The TOC Analyst ensures operational continuity, rapid IT incident detection, and coordinated response across IT, network, and security domains.

 

This position serves as a bridge between the Network Operations (NOC), IT Service Management (ITSM) organization and the EB Cyber Security Operations (CSOC), providing unified visibility into system health, performance and IT incident management.  

 

Key Responsibilities:

  • Monitor enterprise IT systems, network performance, and system alerts via dashboards, telemetry and visibility tools.
  • Conduct real-time triage of events to identify service disruptions, performance degradation, and assist in the remediation for security incidents.
  • Strong understanding of Windows, Linux, and cloud (Azure, AWS, or OCI) environments.
  • Execute established runbooks and escalation protocols to resolve or route IT incidents to appropriate Tier 2/3 teams.
  • Maintain situational awareness dashboards displaying system performance and metrics, security status, and service health.
  • Collaborate with cybersecurity, network, and infrastructure teams to correlate alerts and coordinate IT incident response.
  • Manage and update tickets within ITSM platforms (e.g., ServiceNow, Jira, Confluence).
  • Support root-cause analysis, reporting, and post-incident review documentation.
  • Contribute to continuous improvement of operational monitoring, automation, and alert tuning.
  • Participate in 24x7 on-call rotation or shift schedule as required.

Qualifications

Required:

  • Bachelor’s of Science Degree in Information Technology, Computer Science, Cybersecurity,
  • 5+ years in IT operations, network operations, or cybersecurity monitoring.
  • Experience using SIEM (e.g., Splunk, QRadar, Sentinel), network monitoring (Netbrain, Zabbix), and ITSM systems (ServiceNow), SCCM/INTUNE.
  • Must be able to obtain and maintain a Final DOD security clearance.
  • Occasional on-call or weekend work required during major IT incidents or maintenance windows.

Preferred:

  • CompTIA Security+, Network+, or CySA+
  • Familiarity with IT incident response procedures and ITIL/ITSM workflows.
  • Microsoft Certified: Security Operations Analyst Associate
  • ITIL v4 Foundations
  • CCNA or similar network certification

 

Skills

  • Excellent verbal and written communication skills with executive presence and strong customer service orientation.
  • Ability to handle high-pressure, time-sensitive situations with discretion and professionalism.

Physical Qualifications

Light Lifting

Environmental Attributes

Inside

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed

Join our talent pools, get job alerts, and see EB news

We can recommend jobs specifically for you! Click here to get started.