Demo

Cybersecurity Analyst

National Cooperative Bank
Arlington, VA Full Time
POSTED ON 4/8/2026
AVAILABLE BEFORE 5/6/2026
VA Office

Role Description Summary: The Cybersecurity Analyst supports the organization's Security Operations Center (SOC) by monitoring, detecting, analyzing, and escalating security events across cloud and on-premises environments. This blended analyst role is primarily alert-driven with some proactive threat hunting. The analyst will also help administer and tune key security platforms (SIEM/EDR and related controls), coordinate vulnerability management with IT Operations, and serve as the after-hours escalation point for the MSSP.

Role Responsibilities

  • SOC Monitoring, Triage, and Detection – 35%
  • Monitor and triage security alerts and events from SIEM/EDR and related tools across Azure, AWS, Microsoft 365, Okta/Entra ID, email security platforms, and other SaaS environments.
  • Contribute to tuning and expansion of detection rules and playbooks, help onboard and validate security telemetry for key systems, and identify and recommend improvements to detection coverage and data quality.
  • Follow established playbooks and severity criteria to ensure consistent triage, escalation, and ticket hygiene, maintaining high-quality case notes and evidence in ServiceNow to support operational continuity and audit readiness.
  • Investigation, Threat Hunting, and Analysis – 25%
  • Classify and prioritize alerts using defined criteria (impact, confidence, asset criticality, user risk, threat context) and perform in-depth investigation and analysis across endpoint, identity, email, and cloud signals.
  • Conduct guided threat hunting (IOC-driven and hypothesis-based), use structured analysis methods (e.g., kill chain/diamond model mindset), and document findings and follow-up recommendations to improve detections and response.
  • Investigate identity and access anomalies in Okta and Entra ID (e.g., suspicious sign-ins, MFA challenges, OAuth consent/activity) and escalate in accordance with playbooks.
  • Incident Escalation, Containment, and Response Support – 20%
  • Drive internal alert-handling workflow from detection through validation, enrichment, and escalation to appropriate resolver groups based on severity and playbook guidance.
  • Support incident response by coordinating containment and remediation actions (e.g., endpoint isolation, account disablement, conditional access responses) with IT Operations, Security Engineering, and the MSSP.
  • Maintain escalation communications with stakeholders and vendors, contribute to incident documentation and post-incident reviews, and participate in incident response exercises/tabletops.
  • Vulnerability and Exposure Management – 10%
  • Coordinate vulnerability remediation tracking with IT Operations by prioritizing findings with risk context, tracking remediation progress, supporting exception handling, and validating closure where applicable.
  • Help validate remediation effectiveness, confirm risk reduction, and provide feedback into detection and monitoring improvements based on vulnerability and exposure trends.
  • Metrics, Documentation, and Continuous Improvement – 5%
  • Contribute to SOC metrics and reporting (e.g., MTTD/MTTR, MTTA, backlog, SLA adherence, false-positive trends, detection coverage) and support evidence collection for audits/exams (FFIEC/GLBA) by maintaining traceable alert samples, incident records, and response timelines.
  • Maintain operational SOC documentation (runbooks/playbooks, tuning backlogs, investigation notes) and recommend improvements to processes, tools, and coverage based on operational lessons learned.
  • Threat Intelligence and External Collaboration – 5%
  • Collect, normalize, and operationalize relevant threat intelligence and IOCs into detections and hunts and provide feedback on observed threat activity to inform defensive improvements.
  • Contribute to external information-sharing and collaboration with vendors and partners (including the MSSP) by participating in intake, evaluation, dissemination, and tracking of actionable intelligence.

Skills Needed

  • Strong analytical and investigative skills with attention to detail
  • Working knowledge of security controls and concepts (MITRE ATT&CK, phishing/BEC patterns, malware behaviors, identity attacks, log analysis)
  • Experience investigating alerts across endpoint, identity, email, and cloud signals
  • Familiarity with SIEM content development (KQL, rule logic, detections, parsers, workbooks/dashboards)
  • Strong written and verbal communication abilities for escalation and stakeholder coordination
  • Ability to work independently and make sound decisions under pressure
  • Comfort operating with privileged access to security tools and sensitive customer/enterprise data

Minimum Qualifications

  • Bachelor's degree (required)
  • 3--5 years of hands-on cybersecurity operations experience (SOC / IR / monitoring / detection engineering support)
  • Experience investigating alerts across endpoint, identity, email, and cloud signals
  • Familiarity with FFIEC and GLBA expectations for security monitoring, incident response, and access to sensitive data

Education: Bachelor’s degree in computer science, Information Technology, Cybersecurity, or related field

Preferred/Strongly Desired

  • Experience with Microsoft security ecosystem (Sentinel, Defender, Entra ID) and cloud security monitoring in Azure/AWS
  • Experience with SIEM content development (KQL, rule logic, detections, parsers, workbooks/dashboards)
  • Experience coordinating with an MSSP and managing alert escalation workflows
  • Preferred certifications: CompTIA Security (or equivalent), Microsoft SC-200
  • Nice-to-have: CySA or AZ-500

Work Environment

Hybrid -- Employees will work from both remote and onsite locations. Employees must live within a reasonable commuting distance of the office and are required to be onsite at least two (2) days per week, specifically on Tuesdays and Wednesdays. Certain positions or business needs may require additional in-office days.

AA/EOE

Salary.com Estimation for Cybersecurity Analyst in Arlington, VA
$94,639 to $120,566
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

What is the career path for a Cybersecurity Analyst?

Sign up to receive alerts about other jobs on the Cybersecurity Analyst career path by checking the boxes next to the positions that interest you.
Income Estimation: 
$87,466 - $114,731
Income Estimation: 
$114,790 - $146,930
Income Estimation: 
$115,647 - $153,495
Income Estimation: 
$87,466 - $114,731
Income Estimation: 
$114,790 - $146,930
Income Estimation: 
$115,647 - $153,495
Employees: Get a Salary Increase
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at National Cooperative Bank

  • National Cooperative Bank Hillsboro, OH
  • The position serves as an advocate of the Bank, promoting the Bank’s products, services, and overall NCB culture. Assures quality customer services by answ... more
  • 10 Days Ago

  • National Cooperative Bank Arlington, VA
  • VA Office The Associate General Counsel (AGC) at this mission-driven bank will play a critical role in advancing the Bank’s legal and business objectives, ... more
  • 12 Days Ago

  • National Cooperative Bank Arlington, VA
  • Business Development Officer - Mid-West Region Credit Union Team NCB has more than three decades of experience within the credit union national marketplace... more
  • 16 Days Ago

  • National Cooperative Bank Hillsboro, OH
  • General Deposit Operations Process deposit exceptions Positive pay review Run & review daily reports Check adjustment request Incoming returns Processing r... more
  • 16 Days Ago


Not the job you're looking for? Here are some other Cybersecurity Analyst jobs in the Arlington, VA area that may be a better fit.

  • Spry Squared, Inc. - Cybersecurity and Managed IT Services Washington, DC
  • Job Description Spry Squared is looking for a Cyber Network Defense Analyst for our client to provide Network Operations Security Center (NOSC) support, cy... more
  • 18 Days Ago

  • Spry Squared, Inc. - Cybersecurity and Managed IT Services Washington, DC
  • Job Description Spry Squared is looking for a Cyber Network Defense Analyst for our client to provide Network Operations Security Center (NOSC) support, cy... more
  • 18 Days Ago

AI Assistant is available now!

Feel free to start your new journey!