SOSi · 5 months ago
Cyber Defense Analyst
SOSi is seeking experienced Cyber Defense Analysts to join a mission-driven team operating at the cutting edge of military connectivity. The role involves advanced monitoring, threat hunting, and incident response to protect critical infrastructure from sophisticated cyber threats.
ConsultingGovernmentInformation Technology
Responsibilities
Conduct advanced analysis of network traffic, endpoint telemetry, and security logs to detect stealthy adversary activity
Validate and investigate incidents escalated by AI-assisted SOC tools, ensuring accuracy and reducing false positives
Perform event correlation across SIEM/EDR/SOAR and AI-driven outputs to identify sophisticated multi-stage attacks
Actively participate in proactive threat hunting operations based on MITRE ATT&CK, threat intelligence, and anomaly detection
Lead initial containment and mitigation actions for escalated incidents, coordinate with senior engineers for deep remediation
Support red/blue team exercises and integrate lessons learned into playbooks and detection logic
Collaborate with Detection Engineers and DCAI teams to refine AI models, tune detections, and enhance SOAR playbooks
Develop case studies, incident reports, and root cause analyses for high-severity events
Mentor junior analysts and contribute to NSOC cross-training, syncs, and tabletop exercises
Maintain compliance with NSOC SOPs, DoD cybersecurity policies, and accreditation frameworks (RMF, CSSP)
Qualification
Required
Active in scope SECRET clearance or the ability to obtain SECRET eligibility
Bachelor's Degree in Cybersecurity, Computer Science, Information Systems, or a related technical discipline; equivalent work experience considered
DoD 8140 Intermediate compliant (GFACT or CEH or Cloud+ or CySA+ or PenTest+ or SSCP or Security+ or GSEC)
Strong knowledge of network security principles, intrusion detection, malware analysis, and incident response
Familiarity with adversary TTPs (MITRE ATT&CK) and threat hunting methodologies
Ability to validate and refine AI-driven detections, escalate anomalies, and communicate findings clearly
Experience with packet capture tools (e.g., Wireshark, Zeek) and scripting for analysis (Python, PowerShell, etc.)
Strong written and verbal communication skills for reports, escalations, and executive briefings
Preferred
Active in-scope Top Secret clearance with ability to obtain/maintain TS/SCI
Minimum of three (3) years of SOC/NSOC or equivalent cyber defense experience
Prior experience in a military cyber defense environment or enterprise-level SOC
Hands-on experience with EDR, SOAR, and log analysis platforms
Advanced certifications such as GCIA, GCIH, GDAT, CEH, or CCNA/PCNSE
Experience leading or supporting incident response at the Tier 2/Tier 3 level
Benefits
Relocation packages may include a two-year commitment.
Company
SOSi
SOSi solves the challenges of the modern mission.
Funding
Current Stage
Late StageRecent News
The Latest Tech News from Techreport
2025-11-01
2025-10-06
2025-08-21
Company data provided by crunchbase