Senior Cyber Defense Analyst – Incident Response Lead (CDA Lead / IR Lead) jobs in United States
cer-icon
Apply on Employer Site
company-logo

SOSi · 4 months ago

Senior Cyber Defense Analyst – Incident Response Lead (CDA Lead / IR Lead)

SOSi is seeking a Senior Cyber Defense Analyst – Incident Response Lead to join their elite team in Hawaii, focusing on supporting INDOPACOM warfighters with secure Coalition connectivity. The role involves leading the Cyber Defense Analyst team, guiding incident response efforts, and ensuring alignment between analysts and engineering teams to enhance cyber defense capabilities.

ConsultingGovernmentInformation Technology
badNo H1BnoteSecurity Clearance Requirednote

Responsibilities

Lead the Cyber Defense Analyst team, providing direction on monitoring priorities, triage, and incident investigations
Act as Incident Response Lead (IRL) during escalations, coordinating containment, remediation, and reporting across NSOC, DCAI engineers, and mission partners
Validate and adjudicate escalated detections from AI-assisted SOC tools, ensuring accuracy, prioritization, and timely response
Mentor and coach analysts in advanced detection, threat hunting, and IR skills; provide regular feedback and performance oversight
Serve as primary liaison between analysts and engineering teams (DCAI, Detection Engineering) to refine AI models, SOAR playbooks, and detection logic
Direct threat hunting operations based on adversary TTPs, threat intelligence, and anomaly detection
Ensure incidents are documented to NSOC standards, with case studies and lessons learned integrated into playbooks
Lead red/blue team exercises and tabletop drills to validate analyst readiness and IR procedures
Provide senior-level reporting and executive briefings on major incidents to NSOC leadership and external stakeholders
Maintain compliance with RMF, CSSP, and NSOC SOPs; validate AI-augmented IR processes meet accreditation requirements

Qualification

Incident Response LeadThreat HuntingCyber DefenseSIEM ProficiencyAdvanced CertificationsMalware AnalysisLeadership SkillsExecutive Briefing SkillsCommunication Skills

Required

Active or eligible SECRET security clearance (must be willing to obtain and maintain)
Bachelor's Degree in Cybersecurity, Computer Science, Information Systems, or related technical discipline; equivalent work experience considered
5+ years of SOC/NSOC or cyber defense experience, with demonstrated IR and threat hunting expertise
DoD 8140 Intermediate compliant (GFACT or CEH or Cloud+ or CySA+ or PenTest+ or SSCP or Security+ or GSEC)
Proven experience leading analyst teams or serving as a shift/incident lead
Strong knowledge of adversary TTPs (MITRE ATT&CK), malware analysis, and advanced detection/response techniques
Proficiency with SIEM, EDR, SOAR, and packet capture/analysis tools (e.g., Wireshark, Zeek)
Strong leadership, communication, and briefing skills for technical and executive audiences

Preferred

Active Top Secret clearance with ability to obtain/maintain TS/SCI
Advanced certifications such as GCIA, GCIH, GDAT, CISSP, or GCTI
Experience in a military cyber defense environment or enterprise-level 24/7 SOC
Prior IR Lead/Tier 3 response experience with major incident coordination responsibilities
Experience working alongside AI/ML-assisted SOC platforms and automation pipelines

Company

SOSi solves the challenges of the modern mission.

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Jim Edwards
Chief Growth Officer
linkedin
Company data provided by crunchbase