Sr. Cyber Defense Architect
Location : Fort Meade, MD | Type : Full-Time | Clearance : TS / SCI CI polygraph required
Overview
We are seeking a Sr. Cyber Defense Architect who brings together deep expertise across offensive cyber techniques, blue-team defensive operations, and Splunk engineering to build, evaluate, and strengthen enterprise security from the kernel to the application layer. This is not a traditional SOC analyst or Splunk admin role.
This role requires someone who :
Understands how systems can be exploited at the OS, kernel, and application levels
Knows how those attacks appear in logs, memory, and telemetry
Can architect, tune, and maintain Splunk Enterprise ingestion and SPL analytics
Can evaluate vulnerabilities based on real system impact, not just headlines
Can communicate across red, blue, and purple team environments
Can translate raw system behavior into accurate detections, policies, and risk decisions
This is a highly technical, hands-on role aimed at building a more resilient, detection-driven security posture
Key Responsibilities :
Offensive Understanding & Adversary Insight
Analyze and explain how exploits interact with CPU rings, kernels, drivers, and OS structures.
Identify exploitation paths, misconfigurations, and lateral movement opportunities.
Demonstrate attacker methods and help design the defenses to stop them.
Defensive Cyber & SOC Operations
Investigate alerts with a deep understanding of how system internals behave under attack.
Conduct root cause analysis across logs, processes, memory, and network activity.
Build detection logic tied directly to attacker behavior, not generic signatures.
Threat Hunting
Perform proactive, hypothesis-driven hunts across enterprise telemetry.
Map hunt results to attack chains and OS-level artifacts.
Identify blind spots and propose visibility improvements.
Splunk Architecture & Analytics
Administer Splunk Enterprise, including data ingestion, parsing, indexes, and forwarders.
Develop high-fidelity SPL queries, dashboards, correlation searches, and threat detections.
Normalize logs for consistent detection across OS, network, cloud, containers, and application layers.
Ensure logs reflect true system behavior, not noisy or low-value events.
System & OS Internals Expertise
Explain OS behavior from kernel mode to user mode and across the rings of control.
Understand memory management, syscalls, interrupts, drivers, services, and authentication flows.
Diagnose Linux and Windows artifacts that signal compromise or misconfiguration.
VM, Hypervisor, and Container Knowledge
Understand how VMs virtualize hardware and how containers share the kernel.
Evaluate how vulnerabilities behave differently in VM vs containerized environments.
Assess whether a vulnerability is meaningful based on system architecture and exposure.
Policy Shaping & Risk Context
Assess vulnerability severity in context—not every critical CVE is a critical risk.
Provide recommendations on which vulnerabilities are operationally relevant.
Shape detection, hardening, and response policies based on real technical behavior.
Support leadership by translating system-level findings into clear, actionable guidance.
Minimum Qualifications
Clearance : Active TS / SCI with CI Polygraph
Required Technical Expertise
Deep understanding of Linux and Windows internals, including kernel functions, process behavior, memory, and logging.
Strong hands-on experience with offensive tooling, exploitation concepts, and attacker tradecraft.
Strong defensive background in SOC operations, detection engineering, and threat analysis.
Ability to build and optimize raw SPL, develop detections, and administer Splunk data flows.
Understanding of network stacks, OSI model behavior in the OS, and how telemetry is generated.
Hybrid Skillset Requirements
Comfortable switching between attacker mindset and defender mindset.
Able to articulate complex system interactions clearly and accurately.
Understands system impact and can differentiate theoretical vs practical risk.
Capable of building detections from first principles—understanding the behavior itself, not relying on feeds.
Soft Skills
Strong communication skills across technical and non-technical stakeholders.
Ability to walk red, blue, and purple team members through system-level logic.
Detail-oriented thinker who can contextualize threats within mission needs.
Desired Background
Senior Red Team Operator with Blue Team experience
Senior SOC Analyst with OS internals and detection engineering background
Splunk Engineer with adversary and system knowledge
Cyber Defense Operator with purple team exposure
Security Architect with hands-on operational experience
Compensation & Benefits
Salary Range : $200,000 – $255,000 annually
Final compensation will depend on experience, qualifications, internal equity, and market data. DarkStar provides a competitive and comprehensive benefits package for full-time employees.
Additional Details
Travel : Minimal
Work Environment : On-site at Fort Meade, MD
Security Note
All applicants must be U.S. citizens and maintain eligibility for a U.S. government security clearance.
About DarkStar Intelligence
DarkStar Intelligence is a Service-Disabled Veteran-Owned Small Business (SDVOSB) committed to advancing national security through mission support and tradecraft development. We prioritize both client satisfaction and employee retention, delivering high-quality, intelligence-based solutions grounded in our “Core Four” values :
Humility : We place mission success above personal recognition.
Passion : We bring enthusiasm and dedication to every challenge.
Agility : We adapt quickly to evolving operational needs.
Ownership : We hold ourselves accountable for results and uphold the highest standards of excellence.
We are mission-driven and results-oriented, striving to make our country safer through every task we undertake.
Equal Employment Opportunity (EEO) Commitment
At DarkStar Intelligence LLC, we are committed to maintaining a professional and legally compliant work environment where individuals are treated with respect and fairness. We adhere strictly to all applicable Equal Employment Opportunity (EEO) laws and regulations.
Employment decisions at DarkStar are made solely on the basis of individual qualifications, performance, and business needs. We prohibit discrimination in all aspects of employment—including hiring, compensation, promotion, training, discipline, and termination—on the basis of : Race or color, Religion, Sex (including pregnancy, sexual orientation, and gender identity), National origin, Age, Disability, Genetic information, Veteran status. Or any other status protected by applicable federal, state, or local law
Our EEO standards are embedded in all employment practices to ensure compliance, fairness, and accountability. We enforce a zero-tolerance policy for unlawful discrimination or harassment and encourage employees to report concerns without fear of retaliation.
EEO Flyer : shorturl.at / abpNX
Employee Benefits
DarkStar Intelligence provides a competitive and comprehensive benefits package to support the health, financial stability, and personal well-being of our team members.
Core Benefits for employees :
Health Coverage : Medical, dental, and vision plans
Income Protection : Life insurance, short-term disability, and long-term disability
Retirement Planning : 401(k) plan with employer contributions
Work-Life Support : Employee Assistance Program (EAP) and legal services
Paid Leave : Generous PTO, 11 paid federal holidays, and one floating holiday
Voluntary Benefits :
Legal & Identity Protection : LegalShield and IDShield
Additional Insurance : Whole life, accident, and critical care coverage
We believe in recognizing and supporting the professionals who make our mission possible. Your well-being is an investment in our collective success.
Powered by JazzHR
Cyber Architect • Fort Meade, MD, United States