
SOC Cyber Defense Analyst – SME, Journeyman
Akira Technologies
full-time
Posted on:
Location Type: Office
Location: Norfolk • Virginia • 🇺🇸 United States
Visit company websiteSalary
💰 $125,000 - $140,000 per year
Job Level
Mid-LevelSenior
Tech Stack
Cyber SecurityLinuxSplunkVMware
About the role
- Perform cyber defense monitoring and forensic analysis across host and network systems, including malware triage, log correlation, and timeline reconstruction
- Investigate security incidents using MITRE ATT&CK and Cyber Kill Chain methodologies
- Support containment, eradication, and recovery actions in accordance with established incident response procedures
- Serve as a journeyman-level SME, providing technical guidance and mentoring to junior SOC analysts
- Monitor, tune, and enhance SIEM platforms (e.g., Splunk Enterprise Security, Elastic SIEM, Cribl) to improve detection and threat visibility
- Develop and maintain SIEM correlation rules, dashboards, and continuous monitoring content using data models and tstats
- Evaluate system and network configurations for vulnerabilities and recommend remediation aligned with DoD cybersecurity standards
- Support STIG compliance activities and assist with Information Assurance Vulnerability Management (IVAM) actions
- Utilize asset mapping and inventory tools to validate authorized devices and identify unauthorized or anomalous systems
- Handle digital evidence in accordance with government forensic and chain-of-custody best practices
- Produce concise technical and executive-level reports detailing findings, impacts, and mitigation recommendations
- Collaborate with SOC leadership and government stakeholders to improve SOC workflows, threat hunting, and operational effectiveness
Requirements
- Active Top Secret clearance (or higher)
- 5–7 years of experience in cybersecurity operations, SOC analysis, or incident response
- Strong knowledge of Windows and Linux operating systems, network traffic analysis, and security monitoring
- Experience working within DoD cybersecurity frameworks and compliance-driven environments
- Hands-on experience with tools such as Splunk (Enterprise Security preferred), Palo Alto, Elastic SIEM, Cribl, Nessus, CrowdStrike, VMware, or similar technologies
- Demonstrated ability to independently lead investigations and communicate findings to technical and non-technical audiences
Benefits
- Akira offers its employees multiple options for medical plans (some with Health Savings Account)
- dental plans, and vision coverage
- 401(k) plan with employer match
- To promote work/life balance, Akira offers paid time off, including vacation and sick time, holidays, paid parental leave, military leave, bereavement leave, and jury duty leave
- short and long-term disability benefits to protect employee income in the event of sickness or injury
- life insurance
- accidental death and dismemberment insurance
- critical illness insurance
- Akira also offers tuition, training, and certification reimbursement for professional development and career advancement
- Akira regularly reviews our total rewards package to ensure our offerings remain competitive and reflect the values and needs expressed by our employees
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
cyber defense monitoringforensic analysismalware triagelog correlationtimeline reconstructionSIEM correlation rulesvulnerability assessmentincident responsenetwork traffic analysissecurity monitoring
Soft skills
technical guidancementoringcollaborationcommunicationleadership
Certifications
Top Secret clearance