
Cyber Defense Analyst
- Hawaii
- Permanent
- Full-time
Essential Job DutiesCyber Defense Analysts at the Hawaii NSOC are responsible for advanced monitoring, threat hunting, and incident response, leveraging SIEM, EDR, SOAR, firewalls, and AI-assisted detection platforms. As AI assumes routine monitoring tasks, analysts focus on higher-order analysis, adversary tracking, and complex incident handling. Analysts work closely with engineers, detection specialists, and leadership to ensure resilient, continuous defense of mission-critical networks.
- Conduct advanced analysis of network traffic, endpoint telemetry, and security logs to detect stealthy adversary activity.
- Validate and investigate incidents escalated by AI-assisted SOC tools, ensuring accuracy and reducing false positives.
- Perform event correlation across SIEM/EDR/SOAR and AI-driven outputs to identify sophisticated multi-stage attacks.
- Actively participate in proactive threat hunting operations based on MITRE ATT&CK, threat intelligence, and anomaly detection.
- Lead initial containment and mitigation actions for escalated incidents, coordinate with senior engineers for deep remediation.
- Support red/blue team exercises and integrate lessons learned into playbooks and detection logic.
- Collaborate with Detection Engineers and DCAI teams to refine AI models, tune detections, and enhance SOAR playbooks.
- Develop case studies, incident reports, and root cause analyses for high-severity events.
- Mentor junior analysts and contribute to NSOC cross-training, syncs, and tabletop exercises.
- Maintain compliance with NSOC SOPs, DoD cybersecurity policies, and accreditation frameworks (RMF, CSSP).
- Active in scope SECRET clearance or the ability to obtain SECRET eligibility.
- Bachelor’s Degree in Cybersecurity, Computer Science, Information Systems, or a related technical discipline; equivalent work experience considered.
- DoD 8140 Intermediate compliant (GFACT or CEH or Cloud+ or CySA+ or PenTest+ or SSCP or Security+ or GSEC).
- Strong knowledge of network security principles, intrusion detection, malware analysis, and incident response.
- Familiarity with adversary TTPs (MITRE ATT&CK) and threat hunting methodologies.
- Ability to validate and refine AI-driven detections, escalate anomalies, and communicate findings clearly.
- Experience with packet capture tools (e.g., Wireshark, Zeek) and scripting for analysis (Python, PowerShell, etc.).
- Strong written and verbal communication skills for reports, escalations, and executive briefings.
- Active in-scope Top Secret clearance with ability to obtain/maintain TS/SCI.
- Minimum of three (3) years of SOC/NSOC or equivalent cyber defense experience.
- Prior experience in a military cyber defense environment or enterprise-level SOC.
- Hands-on experience with EDR, SOAR, and log analysis platforms.
- Advanced certifications such as GCIA, GCIH, GDAT, CEH, or CCNA/PCNSE.
- Experience leading or supporting incident response at the Tier 2/Tier 3 level.
- Location: Hawaii NSOC.
- Schedule: 10-hour shifts, 4 days per week, with Wednesday reserved for cross-team training, AI validation, and playbook refinement.
- Environment: Fast-paced, mission-critical operations requiring flexibility for off-hours escalations.
- Relocation packages may include a two-year commitment.