Woodlawn, MD

Senior SOC Analyst

Job Specs

Cyber Defense
Woodlawn, Maryland, United States

Job Description:

XOR Security is currently seeking a talented Senior Security Operations Center Analyst to support an Agency-level Advanced Cyber Analytics team. This program provides targeted threat monitoring and response capabilities requiring analysts to have advanced levels of experience in security event monitoring, incident response, malware analysis and reverse engineering, cyber intelligence, insider threat, penetration testing, and fusion analysis (skills in more than one cyber discipline are preferred).  The positions will respectively focus on Cyber Threat Analysis.  To support this vital mission, XOR staff are on the forefront of providing Advanced Analytics, Cyber Offense, and Systems Engineering support to include the development of advanced analytics and countermeasures to protect critical assets from hostile adversaries. To ensure the integrity, security, and resiliency of critical operations, we are seeking candidates with diverse backgrounds in cyber security systems operations, analysis and incident response. Strong written and verbal communications skills are a must. The ideal candidate will have a solid understanding of cyber threats and information security in the domains of TTP’s, Threat Actors, Campaigns, and Observables. Additionally, the ideal candidate would be an expert in penetration testing and exploit development and familiar with intrusion detection systems, intrusion analysis, security information event management platforms, endpoint threat detection tools, big data analytics, and cyber defense operations. 

Schedule: Wednesday - Sunday from 6am - 4pm

Job Requirements:

  • In-depth knowledge of the US-CERT Federal Incident Notification Guidelines
  • 6 years of Information Technology experience, with at least 4 years of experience in information security working within security operations
  • Splunk, RSA Security Analytics and Akamai WAF experience preferred
  • Working knowledge of TrendMicro and McAfee host based solutions
  • Career proven knowledge of log, network, and system forensic investigation techniques
  • Significant experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logs
  • Significant experience with packet analysis (Wireshark) and Malware analysis preferred
  • Intelligence driven defense utilizing the Cyber Kill Chain (CKC)
  • Knowledge of diverse operating systems, networking protocols, systems administration and security technologies
  • Knowledge of TCP/IP Networking and knowledge of the OSI model
  • Experience creating actionable content for a diverse range of commercial security tools and/or SIEM technologies
  • Significant experience monitoring threats via a SIEM console
  • Excellent problem solving, critical thinking, and analytical skills with the ability to de-construct problems
  • Strong customer service skills and decision-making skills
  • Working knowledge of client infrastructure preferred


  • Bachelor's degree in Computer Science or related field or equivalent work experience
  • Certified Information Systems Security Professional or Associate
  • Formal IT Security/Network Certification such as SANS GIAC Certified Intrusion Analyst (GCIA), SANS GIAC Network Forensic Analyst (GNFA) or SANS GIAC Certified Incident Handler (GCIH)

Additional Experience Preferred:

  • Minimum 4-years of experience in SOC/CIRT with 2-3 years of specific experience as a senior level analyst, Lead Analyst or Subject Matter Expert (SME).
  • Experience with Splunk, RSA Security Analytics and Akamai Web Application Firewall preferred
  • Experience at the Centers for Medicare and Medicaid Services (CMS) or U.S. Department of Health and Human Services (HHS)
  • Previous SOC/CIRT experience at a federal agency similar in size, scope, and complexity
  • Familiarity with the MITRE ATT&CK framework
  • EC Council Certified Ethical Hacker (CEH)

Position Responsibilities:

  • Perform hunting for malicious activity across the network and digital assets
  • Respond to computer security incidents and conduct threat analysis
  • Identify and act on malicious or anomalous activity
  • Conducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the network
  • Perform detailed investigation and response activities for potential security incidents
  • Provide accurate and priority driven analysis on cyber activity/threats
  • Perform payload analysis of packets
  • Recommends implementation of counter-measures or mitigating controls
  • Ensures all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environment
  • Collaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activity
  • Develop innovative monitoring and detection solutions using client tools and other skillsets such as scripting and content development
  • Mentor junior staff in cybersecurity techniques and processes
  • Create and continuously improve standard operating procedures used by the SOC
  • Resolve or coordinate the resolution of cyber security events
  • Monitor incoming event queues for potential security incidents
  • Create, manage, and dispatch incident tickets
  • Monitor external event sources for security intelligence and actionable incidents
  • Maintain incident logs with relevant activity
  • Document investigation results, ensuring relevant details are passed to SOC Lead, Incident Management team and stakeholders
  • Participate in root cause analysis or lessons learned sessions

Closing Statement:

XOR Security offers a very competitive benefits package including health insurance coverage from first day of employment, 401k with a vested company match, vacation and supplemental insurance benefits.

XOR Security is an Equal Opportunity Employer (EOE). M/F/D/V.

Citizenship Clearance Requirement
Applicants selected may be subject to a government security investigation and must meet eligibility requirements – US CITIZENSHIP REQUIRED.