top of page

CSOC Sr. Cyber Defense Analyst

Information Technology

Martinsburg, WV

$110k-$117k

Position Summary
We are seeking a skilled and motivated Cyber Defense Analyst to help government and commercial customers modernize and secure their operations. Our offerings include program and portfolio management, AI/automation, UX engineering, enterprise app development, data analytics, and telecom infrastructure. Proudly veteran-owned, our teams deliver robust cyber defense—threat detection, incident response, continuous monitoring alongside agile IT and data services. If you seek to grow in a collaborative, mission-centered culture, partnering with agencies like DoD, HHS, CMS, and CDC.



Job Summary
As a Sr. Cyber Defense Analyst supporting the Department of Veterans Affairs, you will serve as a critical leader in the design, development, and operationalization of advanced cybersecurity monitoring and detection capabilities. In this role, you’ll configure and tune a range of security monitoring tools—including Splunk, Microsoft Sentinel, Defender for Endpoint, and SOAR platforms—to identify and respond to sophisticated cyber threats in real time. Your responsibilities will include crafting custom detection logic and queries, mapping threat activity to the MITRE ATT&CK framework, and applying machine learning and pattern analysis to strengthen defenses. You’ll play a key role in onboarding new data sources, developing detection playbooks, and ensuring high-quality, actionable security analytics across VA’s cloud, SaaS, identity, and networking environments. You’ll collaborate with incident response, forensics, and threat intelligence teams, providing expert guidance and clear communication to both technical and non-technical stakeholders. By participating in cyber exercises and regularly assessing the efficacy of analytics and automation, you’ll help maintain a resilient and proactive security posture for the VA, making a direct impact on protecting veteran data and government systems.



Responsibilities

Configure monitoring tools to detect threat actor techniques and/or behavioral indicators

Craft custom search queries using Splunk (SPL), as well as Microsoft Defender for Endpoint and Microsoft Sentinel (KQL) – Must be certified!

Provide subject matter expertise to support security detections in one of the following areas:
- Cloud technologies
- SaaS
- Identity and access management
- Networking
- Splunk (Cert.Required)
- EDR

Map security detections to the MITRE ATT&CK Framework

Research and develop configuration recommendations to facilitate operationalization of new data sources for detection of adversarial activities

Use machine learning and pattern analysis to improve detection of specific types of threats

Collaborate effectively with cross-functional teams, including incident response, forensics, threat intelligence, IT, and network administrators

Clearly communicate technical information and detection-related updates to management and stakeholders

Develop and operationalize advanced security analytics to detect and respond to sophisticated cyber threats in near real-time

Develop and implement detection feedback processes – e.g., tuning false positives, decommissioning, etc.

Ensure completeness and consistency regarding data quality of detections

Monitor the performance of security analytics and automation processes regularly, identifying areas for improvement and taking proactive measures to enhance their efficacy

Leverage Security Orchestration, Automation, and Response (SOAR) platforms to streamline and automate detection and incident response, including enrichment, containment, and remediation actions

Support the operationalization of new security detections, including building reference documentation, investigation guidelines, and tuning considerations

Stay informed about the latest cybersecurity threats, trends, and best practices

Actively participate in cybersecurity exercises, drills, and simulations to improve incident response understanding



Requirements

Candidates must possess a professional-level certification in one of the following subject areas:-

Cloud (ex: GLCD, GCFR), and Splunk certification (required).

Detection engineering (ex: GCDA)

Incident Response/Forensics (ex: GCIH, GCFE, GNFA)– Must be certified!

IDAM (ex: Microsoft Identity and Access Administrator Associate)

SIEM (ex: Splunk Power User and must be certified

Bachelor’s degree in computer science, cybersecurity, information technology, or a related field (or equivalent work experience)

8+ years of experience supporting large-scale IT related projects

7+ years of experience supporting incident response in an enterprise-level Security Operations Center (SOC)

A deep understanding of cybersecurity principles, incident response methodologies, and a proactive mindset to ensure the SOC operates effectively in a high-pressure environment

Strong experience with security technologies including SIEM, IDS/IPS, EDR, and network monitoring tools

Experience with security focused cloud-native tooling such as Azure Sentinel and AWS GuardDuty

Experience with enterprise ticketing systems like ServiceNow

Excellent analytical and problem-solving skills

Ability to work independently and in a team environment to identify errors, pinpoint root causes, and devise solutions with minimal oversight

Ability to function in multiple capacities and learn quickly

Strong verbal and written communication skills



Certification
SANS certifications: GCFE, GCIH, and equivalent level are both required

bottom of page