Akira Technologies

SOC Cyber Defense Analyst – SME, Journeyman

Akira Technologies

full-time

Posted on:

Location Type: Office

Location: Norfolk • Virginia • 🇺🇸 United States

Visit company website
AI Apply
Apply

Salary

💰 $125,000 - $140,000 per year

Job Level

Mid-LevelSenior

Tech Stack

Cyber SecurityLinuxSplunkVMware

About the role

  • Perform cyber defense monitoring and forensic analysis across host and network systems, including malware triage, log correlation, and timeline reconstruction
  • Investigate security incidents using MITRE ATT&CK and Cyber Kill Chain methodologies
  • Support containment, eradication, and recovery actions in accordance with established incident response procedures
  • Serve as a journeyman-level SME, providing technical guidance and mentoring to junior SOC analysts
  • Monitor, tune, and enhance SIEM platforms (e.g., Splunk Enterprise Security, Elastic SIEM, Cribl) to improve detection and threat visibility
  • Develop and maintain SIEM correlation rules, dashboards, and continuous monitoring content using data models and tstats
  • Evaluate system and network configurations for vulnerabilities and recommend remediation aligned with DoD cybersecurity standards
  • Support STIG compliance activities and assist with Information Assurance Vulnerability Management (IVAM) actions
  • Utilize asset mapping and inventory tools to validate authorized devices and identify unauthorized or anomalous systems
  • Handle digital evidence in accordance with government forensic and chain-of-custody best practices
  • Produce concise technical and executive-level reports detailing findings, impacts, and mitigation recommendations
  • Collaborate with SOC leadership and government stakeholders to improve SOC workflows, threat hunting, and operational effectiveness

Requirements

  • Active Top Secret clearance (or higher)
  • 5–7 years of experience in cybersecurity operations, SOC analysis, or incident response
  • Strong knowledge of Windows and Linux operating systems, network traffic analysis, and security monitoring
  • Experience working within DoD cybersecurity frameworks and compliance-driven environments
  • Hands-on experience with tools such as Splunk (Enterprise Security preferred), Palo Alto, Elastic SIEM, Cribl, Nessus, CrowdStrike, VMware, or similar technologies
  • Demonstrated ability to independently lead investigations and communicate findings to technical and non-technical audiences
Benefits
  • Akira offers its employees multiple options for medical plans (some with Health Savings Account)
  • dental plans, and vision coverage
  • 401(k) plan with employer match
  • To promote work/life balance, Akira offers paid time off, including vacation and sick time, holidays, paid parental leave, military leave, bereavement leave, and jury duty leave
  • short and long-term disability benefits to protect employee income in the event of sickness or injury
  • life insurance
  • accidental death and dismemberment insurance
  • critical illness insurance
  • Akira also offers tuition, training, and certification reimbursement for professional development and career advancement
  • Akira regularly reviews our total rewards package to ensure our offerings remain competitive and reflect the values and needs expressed by our employees

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
cyber defense monitoringforensic analysismalware triagelog correlationtimeline reconstructionSIEM correlation rulesvulnerability assessmentincident responsenetwork traffic analysissecurity monitoring
Soft skills
technical guidancementoringcollaborationcommunicationleadership
Certifications
Top Secret clearance