SOSi
Join to apply for the
Cyber Defense Analyst
role at
SOSi 1 day ago Be among the first 25 applicants Join to apply for the
Cyber Defense Analyst
role at
SOSi Sr Talent Acquisition Strategist for SOSi | Cleared | Looking for Cleared IT Candidates | A Seeker of Awesome People!
SOSi
is seeking
experienced Cyber Defense Analysts
to join a mission-driven team operating at the cutting edge of military connectivity. Based in
Hawaii , this team delivers secure, multi-enclave Coalition access to
INDOPACOM warfighters
using advanced
Desktop as a Service (DaaS)
Private Cloud technology. What began as a bold proof of concept has evolved into a robust, high-impact platform—now requiring sharp, strategic minds to protect its critical infrastructure from sophisticated cyber threats. If you're ready to elevate your career and safeguard the future of global defense, this is your call to action! Cyber Defense Analysts at the Hawaii NSOC are responsible for
advanced monitoring, threat hunting, and incident response , leveraging SIEM, EDR, SOAR, firewalls, and AI-assisted detection platforms. As AI assumes routine monitoring tasks, analysts focus on
higher-order analysis, adversary tracking, and complex incident handling . Analysts work closely with engineers, detection specialists, and leadership to ensure resilient, continuous defense of mission-critical networks. Conduct advanced analysis of network traffic, endpoint telemetry, and security logs to detect stealthy adversary activity. Validate and investigate incidents escalated by AI-assisted SOC tools, ensuring accuracy and reducing false positives. Perform event correlation across SIEM/EDR/SOAR and AI-driven outputs to identify sophisticated multi-stage attacks. Actively participate in proactive
threat hunting operations
based on MITRE ATT&CK, threat intelligence, and anomaly detection. Lead initial containment and mitigation actions for escalated incidents, coordinate with senior engineers for deep remediation. Support red/blue team exercises and integrate lessons learned into playbooks and detection logic. Collaborate with Detection Engineers and DCAI teams to refine AI models, tune detections, and enhance SOAR playbooks. Develop case studies, incident reports, and root cause analyses for high-severity events. Mentor junior analysts and contribute to NSOC cross-training, syncs, and tabletop exercises. Maintain compliance with NSOC SOPs, DoD cybersecurity policies, and accreditation frameworks (RMF, CSSP). Active in scope SECRET clearance or the ability to obtain SECRET eligibility. Bachelor’s Degree in Cybersecurity, Computer Science, Information Systems, or a related technical discipline; equivalent work experience considered. DoD 8140 Intermediate compliant (GFACT or CEH or Cloud+ or CySA+ or PenTest+ or SSCP or Security+ or GSEC). Strong knowledge of network security principles, intrusion detection, malware analysis, and incident response. Familiarity with adversary TTPs (MITRE ATT&CK) and threat hunting methodologies. Ability to validate and refine AI-driven detections, escalate anomalies, and communicate findings clearly. Experience with packet capture tools (e.g., Wireshark, Zeek) and scripting for analysis (Python, PowerShell, etc.). Strong written and verbal communication skills for reports, escalations, and executive briefings. Preferred Qualifications Active in-scope Top Secret clearance with ability to obtain/maintain TS/SCI. Minimum of three (3) years of SOC/NSOC or equivalent cyber defense experience. Prior experience in a military cyber defense environment or enterprise-level SOC. Hands-on experience with EDR, SOAR, and log analysis platforms. Advanced certifications such as GCIA, GCIH, GDAT, CEH, or CCNA/PCNSE. Experience leading or supporting incident response at the Tier 2/Tier 3 level. Schedule:
10-hour shifts, 4 days per week, with Wednesday reserved for cross-team training, AI validation, and playbook refinement. Environment:
Fast-paced, mission-critical operations requiring flexibility for off-hours escalations. Relocation packages may include a two-year commitment. Working at SOSi All interested individuals will receive consideration and will not be discriminated against for any reason. Seniority level
Seniority level Not Applicable Employment type
Employment type Full-time Job function
Job function Information Technology Industries Defense and Space Manufacturing Referrals increase your chances of interviewing at SOSi by 2x Inferred from the description for this job
Medical insurance Vision insurance 401(k) Paid maternity leave Paid paternity leave Tuition assistance Disability insurance Get notified about new Defense Analyst jobs in
Honolulu, HI . Military Experimentation & Assessment Analyst - Part Time Casual (PTC)
Information Systems Security Officer (ISSO)
Wahiawa, HI $146,300.00-$176,700.00 6 days ago Honolulu County, HI $145,000.00-$160,000.00 16 hours ago Integrated Air and Missile Defense (IAMD) Analyst
Hickam Village, HI $135,000.00-$160,000.00 2 months ago Operations Analyst Subject Matter Expert
Honolulu, HI $100,000.00-$102,000.00 1 month ago Joint Base Pearl Harbor-Hickam, HI $60,000.00-$110,000.00 6 months ago Honolulu, HI $84,000.00-$88,000.00 1 month ago Military Information Support Operations Analyst
Honolulu County, HI $130,000.00-$155,000.00 1 month ago Honolulu, HI $100,900.00-$176,600.00 13 hours ago Joint Base Pearl Harbor-Hickam, HI $95,000.00-$260,000.00 1 month ago Security Engineer – AI & SOAR Integration
Security Analyst, 2nd Shift (Honolulu, Hawaii)
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Cyber Defense Analyst
role at
SOSi 1 day ago Be among the first 25 applicants Join to apply for the
Cyber Defense Analyst
role at
SOSi Sr Talent Acquisition Strategist for SOSi | Cleared | Looking for Cleared IT Candidates | A Seeker of Awesome People!
SOSi
is seeking
experienced Cyber Defense Analysts
to join a mission-driven team operating at the cutting edge of military connectivity. Based in
Hawaii , this team delivers secure, multi-enclave Coalition access to
INDOPACOM warfighters
using advanced
Desktop as a Service (DaaS)
Private Cloud technology. What began as a bold proof of concept has evolved into a robust, high-impact platform—now requiring sharp, strategic minds to protect its critical infrastructure from sophisticated cyber threats. If you're ready to elevate your career and safeguard the future of global defense, this is your call to action! Cyber Defense Analysts at the Hawaii NSOC are responsible for
advanced monitoring, threat hunting, and incident response , leveraging SIEM, EDR, SOAR, firewalls, and AI-assisted detection platforms. As AI assumes routine monitoring tasks, analysts focus on
higher-order analysis, adversary tracking, and complex incident handling . Analysts work closely with engineers, detection specialists, and leadership to ensure resilient, continuous defense of mission-critical networks. Conduct advanced analysis of network traffic, endpoint telemetry, and security logs to detect stealthy adversary activity. Validate and investigate incidents escalated by AI-assisted SOC tools, ensuring accuracy and reducing false positives. Perform event correlation across SIEM/EDR/SOAR and AI-driven outputs to identify sophisticated multi-stage attacks. Actively participate in proactive
threat hunting operations
based on MITRE ATT&CK, threat intelligence, and anomaly detection. Lead initial containment and mitigation actions for escalated incidents, coordinate with senior engineers for deep remediation. Support red/blue team exercises and integrate lessons learned into playbooks and detection logic. Collaborate with Detection Engineers and DCAI teams to refine AI models, tune detections, and enhance SOAR playbooks. Develop case studies, incident reports, and root cause analyses for high-severity events. Mentor junior analysts and contribute to NSOC cross-training, syncs, and tabletop exercises. Maintain compliance with NSOC SOPs, DoD cybersecurity policies, and accreditation frameworks (RMF, CSSP). Active in scope SECRET clearance or the ability to obtain SECRET eligibility. Bachelor’s Degree in Cybersecurity, Computer Science, Information Systems, or a related technical discipline; equivalent work experience considered. DoD 8140 Intermediate compliant (GFACT or CEH or Cloud+ or CySA+ or PenTest+ or SSCP or Security+ or GSEC). Strong knowledge of network security principles, intrusion detection, malware analysis, and incident response. Familiarity with adversary TTPs (MITRE ATT&CK) and threat hunting methodologies. Ability to validate and refine AI-driven detections, escalate anomalies, and communicate findings clearly. Experience with packet capture tools (e.g., Wireshark, Zeek) and scripting for analysis (Python, PowerShell, etc.). Strong written and verbal communication skills for reports, escalations, and executive briefings. Preferred Qualifications Active in-scope Top Secret clearance with ability to obtain/maintain TS/SCI. Minimum of three (3) years of SOC/NSOC or equivalent cyber defense experience. Prior experience in a military cyber defense environment or enterprise-level SOC. Hands-on experience with EDR, SOAR, and log analysis platforms. Advanced certifications such as GCIA, GCIH, GDAT, CEH, or CCNA/PCNSE. Experience leading or supporting incident response at the Tier 2/Tier 3 level. Schedule:
10-hour shifts, 4 days per week, with Wednesday reserved for cross-team training, AI validation, and playbook refinement. Environment:
Fast-paced, mission-critical operations requiring flexibility for off-hours escalations. Relocation packages may include a two-year commitment. Working at SOSi All interested individuals will receive consideration and will not be discriminated against for any reason. Seniority level
Seniority level Not Applicable Employment type
Employment type Full-time Job function
Job function Information Technology Industries Defense and Space Manufacturing Referrals increase your chances of interviewing at SOSi by 2x Inferred from the description for this job
Medical insurance Vision insurance 401(k) Paid maternity leave Paid paternity leave Tuition assistance Disability insurance Get notified about new Defense Analyst jobs in
Honolulu, HI . Military Experimentation & Assessment Analyst - Part Time Casual (PTC)
Information Systems Security Officer (ISSO)
Wahiawa, HI $146,300.00-$176,700.00 6 days ago Honolulu County, HI $145,000.00-$160,000.00 16 hours ago Integrated Air and Missile Defense (IAMD) Analyst
Hickam Village, HI $135,000.00-$160,000.00 2 months ago Operations Analyst Subject Matter Expert
Honolulu, HI $100,000.00-$102,000.00 1 month ago Joint Base Pearl Harbor-Hickam, HI $60,000.00-$110,000.00 6 months ago Honolulu, HI $84,000.00-$88,000.00 1 month ago Military Information Support Operations Analyst
Honolulu County, HI $130,000.00-$155,000.00 1 month ago Honolulu, HI $100,900.00-$176,600.00 13 hours ago Joint Base Pearl Harbor-Hickam, HI $95,000.00-$260,000.00 1 month ago Security Engineer – AI & SOAR Integration
Security Analyst, 2nd Shift (Honolulu, Hawaii)
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr