Strategic Analysis Incorporated
Principal Cyber Defense Specialist (TS/SCI 25-217) with Security Clearance
Strategic Analysis Incorporated, Fort George Meade, Maryland, United States
Principal Cyber Defense Specialist (TS/SCI 25-217)
Strategic Analysis, Inc. is seeking an experienced Principal Cyber Defense Specialist with prior USCYBERCOM experience to join our team. The ideal candidate will leverage their deep understanding of military cyberspace operations to perform advanced threat analysis, lead incident response efforts, and proactively hunt for threats.
Salary Range: $200k-$225k
Key Responsibilities
Lead in-depth investigations into security incidents, correlating data from multiple sources to understand the scope and impact of attacks.
Proactively search for and identify undiscovered threats within the network using threat intelligence and advanced analytics in Splunk.
Apply hands‑on military DCO tactics, techniques, and procedures to protect and defend critical network infrastructure.
Use Splunk for data ingestion, real‑time searching, and visualization; build dashboards, reports, and alerts to support monitoring and incident response.
Integrate modern Endpoint Detection and Response tools to monitor, detect, and respond to threats on individual host systems.
Analyze and integrate threat intelligence feeds, including DoD sources, to stay current on adversary TTPs and emerging cyber threats.
Document incident timelines, analysis findings, and remediation actions for senior leadership and stakeholders; develop briefings for technical and non‑technical audiences.
Provide subject‑matter expertise to influence and support defensive cyber strategies and operational planning efforts.
Mentor junior analysts, helping to refine investigative and analytical skills.
Required Qualifications
Bachelor's degree in computer science, cybersecurity, IT, or related field (education may be substituted for experience).
8+ years of hands‑on experience in a SOC or DCO role.
Proven experience working with military cyber operations, specifically within USCYBERCOM or a service‑component cyber command.
Demonstrated experience with incident response, malware analysis, and digital forensics.
Extensive knowledge of network protocols (TCP/IP), operating systems (Windows, Linux), and cloud security principles.
Proficiency with Splunk for analysis, alert creation, and dashboard generation.
Hands‑on experience with endpoint security tools; experience with modern EDR solutions highly desirable.
Proficiency with IDS/IPS and packet analysis tools (e.g., Wireshark).
Working knowledge of scripting languages like Python or PowerShell for automation and data analysis.
Strong critical thinking, problem‑solving, communication, and report‑writing skills.
Ability to work independently and collaboratively in a team environment.
Desired Qualifications
Professional certifications such as GMON, GCIH, GSOC, GSE and other GIAC certifications.
Equal Opportunity Employer Strategic Analysis, Inc. is an Equal Opportunity employer and is committed to non‑discrimination in employment. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy, sexual orientation, or gender identity), national origin, disability, age (40 or older), protected veteran status, genetic information (including family medical history) or any other characteristic protected by law.
#J-18808-Ljbffr
Salary Range: $200k-$225k
Key Responsibilities
Lead in-depth investigations into security incidents, correlating data from multiple sources to understand the scope and impact of attacks.
Proactively search for and identify undiscovered threats within the network using threat intelligence and advanced analytics in Splunk.
Apply hands‑on military DCO tactics, techniques, and procedures to protect and defend critical network infrastructure.
Use Splunk for data ingestion, real‑time searching, and visualization; build dashboards, reports, and alerts to support monitoring and incident response.
Integrate modern Endpoint Detection and Response tools to monitor, detect, and respond to threats on individual host systems.
Analyze and integrate threat intelligence feeds, including DoD sources, to stay current on adversary TTPs and emerging cyber threats.
Document incident timelines, analysis findings, and remediation actions for senior leadership and stakeholders; develop briefings for technical and non‑technical audiences.
Provide subject‑matter expertise to influence and support defensive cyber strategies and operational planning efforts.
Mentor junior analysts, helping to refine investigative and analytical skills.
Required Qualifications
Bachelor's degree in computer science, cybersecurity, IT, or related field (education may be substituted for experience).
8+ years of hands‑on experience in a SOC or DCO role.
Proven experience working with military cyber operations, specifically within USCYBERCOM or a service‑component cyber command.
Demonstrated experience with incident response, malware analysis, and digital forensics.
Extensive knowledge of network protocols (TCP/IP), operating systems (Windows, Linux), and cloud security principles.
Proficiency with Splunk for analysis, alert creation, and dashboard generation.
Hands‑on experience with endpoint security tools; experience with modern EDR solutions highly desirable.
Proficiency with IDS/IPS and packet analysis tools (e.g., Wireshark).
Working knowledge of scripting languages like Python or PowerShell for automation and data analysis.
Strong critical thinking, problem‑solving, communication, and report‑writing skills.
Ability to work independently and collaboratively in a team environment.
Desired Qualifications
Professional certifications such as GMON, GCIH, GSOC, GSE and other GIAC certifications.
Equal Opportunity Employer Strategic Analysis, Inc. is an Equal Opportunity employer and is committed to non‑discrimination in employment. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy, sexual orientation, or gender identity), national origin, disability, age (40 or older), protected veteran status, genetic information (including family medical history) or any other characteristic protected by law.
#J-18808-Ljbffr