Cyber Defense Analyst jobs in United States
cer-icon
Apply on Employer Site
company-logo

SOSi · 5 months ago

Cyber Defense Analyst

SOSi is seeking experienced Cyber Defense Analysts to join a mission-driven team operating at the cutting edge of military connectivity. The role involves advanced monitoring, threat hunting, and incident response to protect critical infrastructure from sophisticated cyber threats.

ConsultingGovernmentInformation Technology
badNo H1BnoteSecurity Clearance Requirednote

Responsibilities

Conduct advanced analysis of network traffic, endpoint telemetry, and security logs to detect stealthy adversary activity
Validate and investigate incidents escalated by AI-assisted SOC tools, ensuring accuracy and reducing false positives
Perform event correlation across SIEM/EDR/SOAR and AI-driven outputs to identify sophisticated multi-stage attacks
Actively participate in proactive threat hunting operations based on MITRE ATT&CK, threat intelligence, and anomaly detection
Lead initial containment and mitigation actions for escalated incidents, coordinate with senior engineers for deep remediation
Support red/blue team exercises and integrate lessons learned into playbooks and detection logic
Collaborate with Detection Engineers and DCAI teams to refine AI models, tune detections, and enhance SOAR playbooks
Develop case studies, incident reports, and root cause analyses for high-severity events
Mentor junior analysts and contribute to NSOC cross-training, syncs, and tabletop exercises
Maintain compliance with NSOC SOPs, DoD cybersecurity policies, and accreditation frameworks (RMF, CSSP)

Qualification

CybersecurityIncident responseThreat huntingNetwork securitySIEMEDRSOARMITRE ATT&CKPacket captureCommunication skillsMentoringCollaboration

Required

Active in scope SECRET clearance or the ability to obtain SECRET eligibility
Bachelor's Degree in Cybersecurity, Computer Science, Information Systems, or a related technical discipline; equivalent work experience considered
DoD 8140 Intermediate compliant (GFACT or CEH or Cloud+ or CySA+ or PenTest+ or SSCP or Security+ or GSEC)
Strong knowledge of network security principles, intrusion detection, malware analysis, and incident response
Familiarity with adversary TTPs (MITRE ATT&CK) and threat hunting methodologies
Ability to validate and refine AI-driven detections, escalate anomalies, and communicate findings clearly
Experience with packet capture tools (e.g., Wireshark, Zeek) and scripting for analysis (Python, PowerShell, etc.)
Strong written and verbal communication skills for reports, escalations, and executive briefings

Preferred

Active in-scope Top Secret clearance with ability to obtain/maintain TS/SCI
Minimum of three (3) years of SOC/NSOC or equivalent cyber defense experience
Prior experience in a military cyber defense environment or enterprise-level SOC
Hands-on experience with EDR, SOAR, and log analysis platforms
Advanced certifications such as GCIA, GCIH, GDAT, CEH, or CCNA/PCNSE
Experience leading or supporting incident response at the Tier 2/Tier 3 level

Benefits

Relocation packages may include a two-year commitment.

Company

SOSi solves the challenges of the modern mission.

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Jim Edwards
Chief Growth Officer
linkedin
Company data provided by crunchbase