Senior Cyber Defense Analyst – Incident Response Lead (CDA Lead / IR Lead) at SOSi
Ford Island, Hawaii, USA -
Full Time


Start Date

Immediate

Expiry Date

05 Dec, 25

Salary

0.0

Posted On

05 Sep, 25

Experience

5 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Gcih, Edr, Computer Science, Soar, Information Systems, Sscp, Malware Analysis, Cissp, Security+, Siem, Gcia

Industry

Information Technology/IT

Description

Overview
SOSi is seeking a Senior Cyber Defense Analyst – Incident Response Lead to join our elite team in Hawaii, where cutting-edge technology meets mission-critical operations. Supporting INDOPACOM warfighters with secure, multi-enclave Coalition connectivity, our team leverages advanced Desktop as a Service (DaaS) Private Cloud infrastructure to deliver resilient and scalable solutions.
As the CDA Lead, you’ll serve as the operational heartbeat of our Hawaii NSOC, guiding day-to-day monitoring, threat hunting, and incident response. You’ll lead escalations as the Incident Response Lead (IRL), validate AI-assisted detections, contain complex threats, and ensure analyst teams are aligned with NSOC leadership and engineering staff to maintain mission assurance. This is your opportunity to shape the future of cyber defense in one of the most strategically vital regions on Earth.

MINIMUM REQUIREMENTS

  • Active or eligible SECRET security clearance (must be willing to obtain and maintain).
  • Bachelor’s Degree in Cybersecurity, Computer Science, Information Systems, or related technical discipline; equivalent work experience considered.
  • 5+ years of SOC/NSOC or cyber defense experience, with demonstrated IR and threat hunting expertise.
  • DoD 8140 Intermediate compliant (GFACT or CEH or Cloud+ or CySA+ or PenTest+ or SSCP or Security+ or GSEC).
  • Proven experience leading analyst teams or serving as a shift/incident lead.
  • Strong knowledge of adversary TTPs (MITRE ATT&CK), malware analysis, and advanced detection/response techniques.
  • Proficiency with SIEM, EDR, SOAR, and packet capture/analysis tools (e.g., Wireshark, Zeek).
  • Strong leadership, communication, and briefing skills for technical and executive audiences.

PREFERRED QUALIFICATIONS

  • Active Top Secret clearance with ability to obtain/maintain TS/SCI.
  • Advanced certifications such as GCIA, GCIH, GDAT, CISSP, or GCTI.
  • Experience in a military cyber defense environment or enterprise-level 24/7 SOC.
  • Prior IR Lead/Tier 3 response experience with major incident coordination responsibilities.
  • Experience working alongside AI/ML-assisted SOC platforms and automation pipelines.

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities
  • Lead the Cyber Defense Analyst team, providing direction on monitoring priorities, triage, and incident investigations.
  • Act as Incident Response Lead (IRL) during escalations, coordinating containment, remediation, and reporting across NSOC, DCAI engineers, and mission partners.
  • Validate and adjudicate escalated detections from AI-assisted SOC tools, ensuring accuracy, prioritization, and timely response.
  • Mentor and coach analysts in advanced detection, threat hunting, and IR skills; provide regular feedback and performance oversight.
  • Serve as primary liaison between analysts and engineering teams (DCAI, Detection Engineering) to refine AI models, SOAR playbooks, and detection logic.
  • Direct threat hunting operations based on adversary TTPs, threat intelligence, and anomaly detection.
  • Ensure incidents are documented to NSOC standards, with case studies and lessons learned integrated into playbooks.
  • Lead red/blue team exercises and tabletop drills to validate analyst readiness and IR procedures.
  • Provide senior-level reporting and executive briefings on major incidents to NSOC leadership and external stakeholders.
  • Maintain compliance with RMF, CSSP, and NSOC SOPs; validate AI-augmented IR processes meet accreditation requirements.
Loading...