Akira Technologies · 2 months ago
Senior SOC Cyber Analyst (Norfolk, VA)
Akira Technologies is seeking a Senior SOC Cyber Defense Analyst to support a government client in Norfolk, VA. This senior-level role is responsible for leading cybersecurity monitoring, forensic analysis, and threat detection across Operational Technology, Industrial Control Systems, and enterprise network environments.
LifestyleMobileSoftware
Responsibilities
Lead cyber defense and forensic analysis across host and network systems, including malware triage, timeline reconstruction, and log correlation
Oversee SOC operations, providing technical guidance and mentorship to junior and journeyman analysts
Manage and tune SIEM platforms (e.g., Splunk, Elastic SIEM, Cribl) to enhance detection capabilities and threat visibility
Conduct forensic investigations and attack reconstruction using the Cyber Kill Chain and MITRE ATT&CK frameworks
Evaluate network and system configurations for vulnerabilities, providing recommendations aligned with DoD security standards
Assess and ensure compliance with Security Technical Implementation Guides (STIGs) and handle Information Assurance Vulnerability Management (IVAM) notifications
Utilize asset mapping tools to verify connected inventory and detect unauthorized devices
Produce detailed technical and executive-level reports summarizing findings, impacts, and recommended mitigations
Collaborate with client leadership to optimize SOC processes, incident response workflows, and threat-hunting strategies
Qualification
Required
Active Secret Clearance (or higher)
Minimum of 5 years of experience in cybersecurity operations, incident response, or SOC analysis
Strong understanding of DoD cybersecurity frameworks, MITRE ATT&CK, and Cyber Kill Chain
Demonstrated expertise in network traffic analysis, vulnerability management, and SIEM engineering
Hands-on experience with tools such as Splunk, Palo Alto, Elastic SIEM, VMware, Nessus, CrowdStrike, or Security Center
Proven ability to lead investigations, mentor team members, and communicate effectively with both technical and non-technical audiences
Relevant certifications such as CISSP, GCIH, CEH, OSCP, or GRID are highly desired
Experience with Nessus, Endgame, CrowdStrike, SCADA systems, and more
Proficiency in Splunk Enterprise Security, using tstats and data models for continuous monitoring
Knowledge of handling security incidents and evidence according to best practices
Preferred
Experience securing Operational Technology (OT) or Industrial Control Systems (ICS) environments
Advanced skill in Splunk Enterprise Security content development (tstats, data models, correlation rules)
Familiarity with tools and protocols such as GrayNoise, Shodan, MODBus, SCADA systems, or PCAP analysis
Strong analytical, troubleshooting, and forensic investigation capabilities
Understanding of evidence handling and cybersecurity best practices for government environments
Benefits
Multiple options for medical plans (some with Health Savings Account)
Dental plans
Vision coverage
401(k) plan with employer match
Paid time off, including vacation and sick time
Holidays
Paid parental leave
Military leave
Bereavement leave
Jury duty leave
Short and long-term disability benefits
Life insurance
Accidental death and dismemberment insurance
Critical illness insurance
Tuition, training, and certification reimbursement for professional development and career advancement