Security Operations Center Analyst - Tier l-Tier lll - Multiple openings! - Greenbelt, MD


Job Order #:



Security Operations Center Analyst - Tier l-Tier lll - Multiple openings! - Greenbelt, MD


Greenbelt, MD 



Salary Type:

per year


IT-Software Development: Computer-Network Security, Desktop Service and Support, Enterprise Software Implementation & Consulting, Network and Server Administration

Job Description:

Security Operations Center Analyst - Tier l-Tier lll - Multiple openings!
Conduct network analysis of targets, operate daily open source research (OSR) missions, resulting in various reports and alerts, and possess extensive knowledge on network, endpoint, threat intelligence, as well as the functioning of specific applications or underlying IT infrastructure, and has some experience with forensics tools, malware analysis, closely involved in developing, tuning and implementing threat detection analytics.
-Perform in depth analysis and triage of network security threat activity based on computer and media forensics, malicious code analysis, and protocol analysis.
-Assist with the development of incident response plans, workflows, and SOPs.
-Deploy and maintain security sensors and tools.
-Monitor security sensors and review logs to identify intrusions.
-Think critically and creatively while analyzing security events, network traffic, and logs to engineer new detection methods.
-Work directly with cyber threat intelligence analysts to convert intelligence into useful detection.
-Collaborate with incident response team to rapidly build detection rules and signatures as needed.
-Identify incident root cause and take proactive mitigation steps.
-Perform lessons learned activities.
-Mentor junior analysts and run brown bag training sessions.
-Review vulnerabilities and track resolution.
-Review and process threat intel reports and sources.
-Develop and implement detection use cases.
-Develop and implement IDS signatures.
-Assist with incident response efforts.
-Create and brief customer reports.
-Participate in on-call rotation for after-hours security and/or engineering issues.
-Perform customer security assessments.
-Develop and run table top exercises.
Preferred, but not Mandatory Qualifications:
-Bachelor’s Degree in a relevant major from an accredited college or university.
-Minimum years of continuous and progressive experience.
-Understanding of root causes of malware infections and proactive mitigation.
-Understanding of lateral movement and footholds.
-Understanding of data exfiltration techniques.  Demonstrated ability in critical thinking, problem solving, and analytics.
-Knowledge of network routing and switching fundamentals to include knowledge of Multiprotocol Layer Switching (MPLS).
-Technical understanding of operating systems, network architecture and design, Active Directory (AD) application log consumables, systems design as well as superior knowledge of technical operations process and procedures.
-Knowledge of encryption, key management and cryptology.
-Familiarity with the Risk Management Framework (NIST 800-37), Security Controls as described in NIST 800-35, and the Federal Information Security Modernization Act (FISMA) operating standards and applicable guidelines.
-Experience with performing threat modelling, risk analysis, root cause analysis, risk identification, and risk mitigation.
-Experience planning and implementing secure networking practices such as: application segmentation, network segmentation, NAC and other access control testing/validation, updating access control SOPs.
-Ability to configure and develop an enterprise SIEM solution including signature tuning, development of correlation rules, reports, and alarms.
-Familiarity with a variety of web application protocols, web services (components including JavaScript, XML, JSON), scripting capabilities (Power shell, Python) software development frameworks, operating systems, and networking technologies. Understanding of various web application frameworks such as ASP.NET, J2EE.
-Enjoy analyzing patterns looking for outliers.
-Enjoy creating ways to find needles in haystacks.
-Have real world experience analyzing complex attacks and understand TTPs of threat actors.
-Define relationships between seemingly unrelated events through deductive reasoning.
-Network/host based intrusion analysis, malware analysis, forensics, and cyber threat intel.
-Knowledge of advanced threat actors and complex attacks.
-Possess excellent writing skills and the ability to communicate to teammates as well as technical and executive level staff.
-Knowledge of Splunk.
Candidates must have at least 1 of the following certifications:
-CERT Certified Computer Security Incident Handler
-Electronic Commerce Council Certified Ethical Hacker (ECC)
-GIAC Information Security Fundamentals (GISF)
-ISC2 Certified Information System Security Professional (CISSP)
Keywords:  Greenbelt MD Jobs, Security Operations Center Analyst, Network Equipment, Threat Intelligence, Forensics, Malware, MPLS, Active Directory, Maryland Recruiters, Information Technology Jobs, IT Jobs, Maryland Recruiting
If you are an employer and recruiting for similar IT professionals / positions, please contact our Technical Recruiters at Next Step Systems  We are a national IT Recruiting Firm / Agency specializing in full-time direct hire Information Technology employment opportunities.
No Corp-To-Corp Or Third Party Recruiters; W-2 Direct Hire Only.
To Apply Now, Send Your Resume To
Please check out all of our jobs at,,, and
Company Info
Next Step Systems
Chicago, IL, United States


Company Profile