MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.

I'm not curious

SOC Analyst - Mid Level

Location White Marsh, United States
Posted 29-September-2021

Position Title: Cyber Security Analyst - Security Operation Center

Location: Woodlawn MD

Hours: Wed. - Sat. 12 PM - 10 PM

Iron Vine Security is a rapidly growing information security and information technology company in Washington, DC. We are looking to hire a Cyber Security Analyst to provide a full range of cyber security services on a long term contract in Baltimore, MD. The position is full time/permanent and will support a US Government civilian agency. The position is available immediately upon finding a qualified candidate with the appropriate background clearance.

Job Requirements:

Must have familiarity with US-CERT Federal Incident Notification Guidelines5 years of Information Technology experience, with at least 2 years of experience in information security working within security operations and 2 years' experience monitoring threats via a SIEM consoleDetailed understanding of NIST Special Publication 800-61 Revision 2, Computer Security Incident Handling GuideExceptional working knowledge of TCP/IP Networking and the OSI modelIn-depth knowledge of the Intelligence driven defense utilizing the Cyber Kill Chain (CKC)Significant experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, Firewall logs, or intrusion prevention logsSignificant experience with packet analysis (Wireshark) and Malware analysisStrong working knowledge of Splunk, RSA Security Analytics and Akamai WAF experience preferredStrong customer service skills and decision-making skillsStrong working knowledge of windows and Linux command-line tools, networking protocols, systems administration and security technologiesStrong working knowledge Hypertext Transfer Protocol response status codesExperience creating actionable content for a diverse range of commercial security tools and/or SIEM technologiesExcellent problem solving, critical thinking, and analytical skills with the ability to de-construct problems


Bachelor's degree in Computer Science or related field or equivalent work experienceCertified Information Systems Security Professional or AssociateEC Council Certified Ethical Hacker (CEH)Formal IT Security/Network Certification such as SANS GIAC Certified Intrusion Analyst (GCIA), SANS GIAC Network Forensic Analyst (GNFA) or SANS GIAC Certified Incident Handler (GCIH)

Additional Experience Preferred:

Minimum of 4 years' experience in SOC/CIRT with 2-3 years of specific experience as a Lead AnalystExperience with Splunk, RSA Security Analytics and Akamai Web Application Firewall preferredExperience at the Centers for Medicare and Medicaid Services (CMS) or U.S. Department of Health and Human Services (HHS)Previous SOC/CIRT experience at a federal agency similar in size, scope, and complexity

Position Responsibilities:

Perform hunting for malicious activity across the network and digital assetsRespond to computer security incidents and conduct threat analysisIdentify and act on malicious or anomalous activityConducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the networkPerform detailed investigation and response activities for potential security incidentsProvide accurate and priority driven analysis on cyber activity/threatsPerform payload analysis of packetsRecommends implementation of counter-measures or mitigating controlsEnsures all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environmentCollaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activityMentor junior staff in cybersecurity techniques and processesCreate and continuously improve standard operating procedures used by the SOCResolve or coordinate the resolution of cyber security eventsMonitor incoming event queues for potential security incidentsCreate, manage, and dispatch incident ticketsMonitor external event sources for security intelligence and actionable incidentsMaintain incident logs with relevant activityDocument investigation results, ensuring relevant details are passed to SOC Lead, Incident Management team and stakeholdersParticipate in root cause analysis or lessons learned sessionsWrite technical articles for knowledge sharingEstablish and maintain excellent working relationships/partnerships with the cyber security and infrastructure support teams throughout the Information Technology organization, as well as business units

Iron Vine Security is an equal opportunity employer. All qualified applicants are considered for employment without regard to race, color, age, religion, sex, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other category protected by applicable federal, state or local laws.

Awards & Accolades for MyTechLogy
Winner of
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url