hero

Hiring partners are below, but we're here to help!

First, submit your resume to us directly so we can help make personal intros. We'll be able to vouch for your candidacy and can encourage partners to review your profile! From there, share this with any mission-driven job-seekers in your network; we'd be glad to support them, too.
companies
Jobs

CSOC Sr. Cyber Defense Analyst

Theta

Theta

IT
Martinsburg, WV, USA
USD 120k-150k / year
Posted on Oct 22, 2025

About theta.

theta. is a. SBA-Certified 8(a) & HUBZone digital integration and management firm based in Baltimore, MD, working to create a world where tech works for everybody. Our mission is to bridge the gap between the intersection of innovation & technology and practical applications that serve the public interest.

We specialize in delivering software, services, and tools that enhance efficiency, security, and accessibility in government operations. Our commitment to be of service, be passionate, and be different drives us to deliver projects that make a significant impact.

Position Overview

We’re seeking a Sr. Cyber Defense Analyst to join our team, supporting the Department of Veterans Affairs’ Cybersecurity Operations Center (CSOC).

In this role, you’ll serve as a technical leader in detection engineering and automation, building, tuning, and operationalizing advanced cybersecurity analytics that defend national systems serving veterans and the public.

You’ll lead initiatives that integrate data across SIEM, SOAR, and EDR platforms, craft custom detections using Splunk SPL and KQL, and apply the MITRE ATT&CK framework to identify and mitigate adversary behaviors.

As a senior member of the SOC, you’ll mentor analysts, drive automation improvements, and collaborate across threat intel, forensics, and engineering teams to evolve VA’s cyber defense posture.

Key Responsibilities:

  • Engineer and tune detections across Splunk, Microsoft Sentinel, Defender for Endpoint, and other monitoring tools to detect advanced threats in real time.
  • Design and implement detection logic, map activity to MITRE ATT&CK, and reduce false positives through feedback loops and automated correlation.
  • Leverage SOAR platforms to automate enrichment, containment, and remediation workflows for high-priority threats.
  • Onboard and operationalize new data sources, ensuring data quality, completeness, and performance consistency.
  • Apply machine learning and pattern analysis techniques to identify anomalies and improve detection accuracy.
  • Lead detection optimization efforts across cloud, SaaS, identity, and networking environments.
  • Collaborate with cross-functional teams (IR, Forensics, Threat Intel, IT, and Network Engineering) to align threat detection with enterprise operations.
  • Participate in cybersecurity exercises, simulations, and continuous improvement of analytics and automation processes.

Basic Qualifications:

  • Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or related discipline —or equivalent practical experience.
  • 8+ years of experience supporting large-scale IT or cybersecurity programs, including 4+ years in enterprise SOC or IR environments.
  • Deep understanding of security analytics, detection engineering, and incident response methodologies.
  • Proficiency with SIEM, IDS/IPS, EDR, and SOAR platforms (e.g., Splunk, Microsoft Sentinel, Defender for Endpoint).
  • Experience mapping detections to MITRE ATT&CK and tuning detections for high signal fidelity.
  • Strong scripting or query development skills (SPL, KQL, or Python).
  • Excellent written and verbal communication skills.
  • U.S. Citizenship required.
  • Must be able to meet any other requirements for government contracts for which they are hired (e.g., must reside in the U.S., Security Clearances)
  • Some of our clients may occasionally request or require travel. If this concerns you, we encourage you to apply and discuss it with us at your initial interview.

Preferred Qualifications

  • SANS certifications such as GCFE, GCIH, GNFA, or equivalent level are strongly preferred.
  • Experience operationalizing detections in cloud-native security tooling (Azure Sentinel, AWS GuardDuty, Google Chronicle).
  • Familiarity with machine learning models and behavioral analytics for anomaly detection.
  • Experience developing and implementing feedback processes for continuous tuning and performance improvement.

Why Join theta.?:

  • Collaborate with a talented and passionate team committed to making a difference.
  • Work on impactful projects that directly contribute to the efficiency and effectiveness of our country's operations.
  • Enjoy a supportive and inclusive work environment that fosters growth and development.
  • Benefit from a competitive compensation package, including comprehensive health benefits, retirement plans, and flexible work arrangements.

If you are a mission-driven Cyber Defense Analyst eager to design, automate, and lead next-generation detection strategies that protect critical government systems, we encourage you to apply and join our team at theta.

Salary Range: $120,000 - $150,000 (DOE and project-specific details)