Today
Secret
Unspecified
Unspecified
IT - Security
Pearl Harbor, HI (On-Site/Office)
Overview
SOSi is seeking experienced Cyber Defense Analysts to join a mission-driven team operating at the cutting edge of military connectivity. Based in Hawaii, this team delivers secure, multi-enclave Coalition access to INDOPACOM warfighters using advanced Desktop as a Service (DaaS) Private Cloud technology. What began as a bold proof of concept has evolved into a robust, high-impact platform-now requiring sharp, strategic minds to protect its critical infrastructure from sophisticated cyber threats.
If you're ready to elevate your career and safeguard the future of global defense, this is your call to action!
Essential Job Duties
Cyber Defense Analysts at the Hawaii NSOC are responsible for advanced monitoring, threat hunting, and incident response, leveraging SIEM, EDR, SOAR, firewalls, and AI-assisted detection platforms. As AI assumes routine monitoring tasks, analysts focus on higher-order analysis, adversary tracking, and complex incident handling. Analysts work closely with engineers, detection specialists, and leadership to ensure resilient, continuous defense of mission-critical networks.
Minimum Requirements
Preferred Qualifications
Work Environment
Working at SOSi
All interested individuals will receive consideration and will not be discriminated against for any reason.
SOSi is seeking experienced Cyber Defense Analysts to join a mission-driven team operating at the cutting edge of military connectivity. Based in Hawaii, this team delivers secure, multi-enclave Coalition access to INDOPACOM warfighters using advanced Desktop as a Service (DaaS) Private Cloud technology. What began as a bold proof of concept has evolved into a robust, high-impact platform-now requiring sharp, strategic minds to protect its critical infrastructure from sophisticated cyber threats.
If you're ready to elevate your career and safeguard the future of global defense, this is your call to action!
Essential Job Duties
Cyber Defense Analysts at the Hawaii NSOC are responsible for advanced monitoring, threat hunting, and incident response, leveraging SIEM, EDR, SOAR, firewalls, and AI-assisted detection platforms. As AI assumes routine monitoring tasks, analysts focus on higher-order analysis, adversary tracking, and complex incident handling. Analysts work closely with engineers, detection specialists, and leadership to ensure resilient, continuous defense of mission-critical networks.
- Conduct advanced analysis of network traffic, endpoint telemetry, and security logs to detect stealthy adversary activity.
- Validate and investigate incidents escalated by AI-assisted SOC tools, ensuring accuracy and reducing false positives.
- Perform event correlation across SIEM/EDR/SOAR and AI-driven outputs to identify sophisticated multi-stage attacks.
- Actively participate in proactive threat hunting operations based on MITRE ATT&CK, threat intelligence, and anomaly detection.
- Lead initial containment and mitigation actions for escalated incidents, coordinate with senior engineers for deep remediation.
- Support red/blue team exercises and integrate lessons learned into playbooks and detection logic.
- Collaborate with Detection Engineers and DCAI teams to refine AI models, tune detections, and enhance SOAR playbooks.
- Develop case studies, incident reports, and root cause analyses for high-severity events.
- Mentor junior analysts and contribute to NSOC cross-training, syncs, and tabletop exercises.
- Maintain compliance with NSOC SOPs, DoD cybersecurity policies, and accreditation frameworks (RMF, CSSP).
Minimum Requirements
- Active in scope SECRET clearance or the ability to obtain SECRET eligibility.
- Bachelor's Degree in Cybersecurity, Computer Science, Information Systems, or a related technical discipline; equivalent work experience considered.
- DoD 8140 Intermediate compliant (GFACT or CEH or Cloud+ or CySA+ or PenTest+ or SSCP or Security+ or GSEC).
- Strong knowledge of network security principles, intrusion detection, malware analysis, and incident response.
- Familiarity with adversary TTPs (MITRE ATT&CK) and threat hunting methodologies.
- Ability to validate and refine AI-driven detections, escalate anomalies, and communicate findings clearly.
- Experience with packet capture tools (e.g., Wireshark, Zeek) and scripting for analysis (Python, PowerShell, etc.).
- Strong written and verbal communication skills for reports, escalations, and executive briefings.
Preferred Qualifications
- Active in-scope Top Secret clearance with ability to obtain/maintain TS/SCI.
- Minimum of three (3) years of SOC/NSOC or equivalent cyber defense experience.
- Prior experience in a military cyber defense environment or enterprise-level SOC.
- Hands-on experience with EDR, SOAR, and log analysis platforms.
- Advanced certifications such as GCIA, GCIH, GDAT, CEH, or CCNA/PCNSE.
- Experience leading or supporting incident response at the Tier 2/Tier 3 level.
Work Environment
- Location: Hawaii NSOC.
- Schedule: 10-hour shifts, 4 days per week, with Wednesday reserved for cross-team training, AI validation, and playbook refinement.
- Environment: Fast-paced, mission-critical operations requiring flexibility for off-hours escalations.
- Relocation packages may include a two-year commitment.
Working at SOSi
All interested individuals will receive consideration and will not be discriminated against for any reason.
group id: 10237746