Baltimore, MD, USA
5 days ago
Junior SOC Analyst

Looking for an exciting opportunity to make an impact as a Security Operation Center Analyst?

Leidos has an exciting Junior SOC Analyst position located in Baltimore, MD.
 
Our Security Operations Center Analyst will work with an elite team of IT professionals to maintain an optimal environment for critical systems. We are looking to hire a Junior SOC Analyst to provide a full range of cyber security services on a multi-year contract in Baltimore, MD. The position is full-time/permanent and will support a US Government civilian agency.

The position is available immediately upon finding a qualified candidate with the appropriate background clearance.

Morning Shift (Sunday-Wednesday, 6am-4pm EST).

Primary Responsibilities

Perform hunting for malicious activity across the network and digital assetsRespond to computer security incidents and conduct threat analysisIdentify and act on malicious or anomalous activityConducts analysis using a variety of tools and data sets to identify indicators of malicious activityPerform detailed investigation and response activities for potential security incidentsProvide accurate and priority driven analysis on cyber activity/threatsPerform payload analysis of network packetsRecommends implementation of counter-measures or mitigating controlsEnsures all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environmentCollaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activityCreate and continuously improve standard operating procedures used by the SOCResolve or coordinate the resolution of cyber security eventsMonitor incoming event queues for potential security incidentsCreate, manage, and dispatch incident ticketsMonitor external event sources for security intelligence and actionable incidentsMaintain incident logs with relevant activityDocument investigation results, ensuring relevant details are passed to SOC Lead, Incident Management team and stakeholdersParticipate in root cause analysis or lessons learned sessions

Qualifications

2+ years of relevant IT experience with at least 1 year in information security operationsHigh school diploma or higherMust have familiarity with US-CERT Federal Incident Notification GuidelinesKnowledge of log, network, and system forensic investigation techniquesExperience performing analysis of log files from a variety of sources, including individual host logs, network traffic logs, firewall logs, or intrusion prevention/detection logsKnowledge or experience conducting intelligence-driven defense using the MITRE ATT&CK framework and Cyber Kill Chain (CKC)Diverse knowledge base of operating systems, network protocols, system administration, and security technologiesKnowledge of TCP/IP Networking and the OSI modelExperience creating actionable tickets from alerts from a range of security tools and/or SIEM technologiesExcellent problem-solving, critical thinking, and analytical skills with the ability to de-construct problemsStrong customer service skills and decision-making skills

CLEARANCE REQUIREMENTS:

Must be able to obtain and maintain a Public Trust security clearance prior to startUnited States Citizenship is required

Preferred Qualifications

Bachelor’s degree in Computer Science or related fieldCertifications: CompTIA Security+, SANS GCIA/GNFA/GCIH, EC-Council CEH                                                                                                                                                                                                                       Experience working in a Security Operations Center (SOC) environmentExperience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logsExperience with packet analysis (Wireshark) and malware analysisExperience monitoring threats via SIEM consoleExperience with Splunk, Crowdstrike, and Akamai WAFFamiliar with AWS cloud environments, architecture, and servicesExperience with proprietary and open-source deception technologies and platformsExperience with technologies such as Snowflake and Panther CloudExperience using ServiceNow

Our target salary for this position is $60,000 to $65,000 per year.

Original Posting Date:2025-01-24

While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.

Pay Range:Pay Range $55,250.00 - $99,875.00

The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

Confirm your E-mail: Send Email