Information SOC Analyst 1
USA MD Lanham - 5000 Ellin Rd (MDC002), United States
General Dynamics Information Technology
Delivering technology solutions and mission services to every major agency across the U.S. government, defense and intelligence community.Type of Requisition:
RegularClearance Level Must Currently Possess:
NoneClearance Level Must Be Able to Obtain:
NonePublic Trust/Other Required:
MBI (T2)Job Family:
Information SecurityJob Qualifications:
Skills:
Cloud Monitoring, Cybersecurity, Cybersecurity Operations, Incident Response, Splunk Enterprise SecurityCertifications:
NoneExperience:
1 + years of related experienceUS Citizenship Required:
YesJob Description:
Job Summary:As a Junior SOC Analyst on the day shift, you will be responsible for monitoring, analyzing, and responding to security events and incidents across the organization’s network and systems. You will work as part of a dynamic Security Operations Center (SOC) team, assisting in the detection and mitigation of cyber threats. This role requires a strong interest in cybersecurity, attention to detail, and the ability to respond to incidents swiftly and accurately. You will receive mentorship and on-the-job training from senior SOC analysts and other team members.
Key Responsibilities:
- Security Monitoring: Continuously monitor security event feeds, alerts, and dashboards from SIEM (Security Information and Event Management) systems and other security tools to detect suspicious activities.
- Event Triage and Escalation: Perform initial triage on security alerts to determine the severity and potential impact of security incidents. Escalate complex or critical incidents to senior SOC analysts as needed.
- Incident Response: Assist in responding to low-level security incidents, including logging, tracking, and resolving issues per incident response protocols.
- Log Analysis: Review and analyze logs from firewalls, intrusion detection systems (IDS), endpoint protection systems, and other security infrastructure to identify potential threats.
- Documentation: Maintain accurate records of events, incidents, and investigations in the ticketing system. Ensure proper documentation of incident handling steps and resolutions.
- Threat Intelligence: Stay updated on emerging cybersecurity threats and vulnerabilities. Leverage threat intelligence feeds to assist with identifying indicators of compromise (IOCs) within the environment.
- Reporting: Prepare daily and weekly reports summarizing security incidents and SOC activities during the shift.
- Collaboration: Work closely with other SOC analysts, network engineers, and system administrators to ensure effective coordination in addressing security issues.
- Continuous Improvement: Participate in post-incident reviews and provide feedback to improve SOC processes and response strategies.
Qualifications:
Required:
- Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field (or equivalent experience).
- Familiarity with basic networking concepts (e.g., TCP/IP, DNS, firewalls).
- Understanding of common cybersecurity threats and attack techniques (e.g., phishing, malware, brute force attacks).
- Basic knowledge of security tools and technologies (e.g., SIEM, IDS/IPS, firewalls, endpoint protection).
- Strong analytical and problem-solving skills with the ability to work in a fast-paced environment.
- Ability to work the assigned shift of 06:00 AM to 02:00 PM.
Preferred:
- Experience with Security Information and Event Management (SIEM) tools such as Splunk.
- Relevant cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or GIAC Certified Incident Handler (GCIH).
- Familiarity with incident response procedures and frameworks such as NIST, MITRE ATT&CK, or SANS.
Skills and Competencies:
- Attention to Detail: Ability to spot anomalies in security logs and alerts that could indicate potential threats.
- Communication: Strong verbal and written communication skills, with the ability to document incidents clearly and escalate issues effectively.
- Teamwork: Willingness to collaborate with senior analysts and cross-functional teams.
- Learning Aptitude: Eagerness to learn and stay up-to-date on cybersecurity trends and best practices.
The likely salary range for this position is $79,747 - $100,625. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.Scheduled Weekly Hours:
40Travel Required:
NoneTelecommuting Options:
HybridWork Location:
USA MD LanhamAdditional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events atEqual Opportunity Employer / Individuals with Disabilities / Protected VeteransTags: CEH Clearance Cloud CompTIA Computer Science DNS Firewalls GCIH GIAC IDS Incident response Intrusion detection IPS Log analysis Malware MITRE ATT&CK Monitoring NIST SANS SIEM SOC Splunk TCP/IP Threat intelligence Vulnerabilities
Perks/benefits: 401(k) matching Career development Competitive pay Health care Insurance Medical leave Parental leave Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.