SOC Analyst

DMI (Digital Management, LLC)
Crownsville, MD, US
Full-time

About DMI

DMI is a leading global provider of digital services working at the intersection of public and private sectors. With broad capabilities across IT managed services, cybersecurity, cloud migration and application development, DMI provides on-site and remote support to clients within governments, healthcare, financial services, transportation, manufacturing, and other critical infrastructure sectors.

DMI has grown to over 2,100+ employees globally and has been continually recognized as a Top Workplace in both regional and national categories.

About the Opportunity

DMI (Digital Management, is looking for a Security Operations Center (SOC) Analyst with hands-on experience monitoring, detecting, and analyzing threats and cybersecurity events to identify and defend against validated intrusion events.

Daily work includes monitoring network and system security events, conducting threat hunting through event data and activity logs, developing alarms for suspicious or malicious activity, escalating alerts to clients and preparing reports to summarize detected activities.

The SOC Analyst executes and helps to create operational processes for consistent monitoring of client environments and should be familiar with varieties of security tools and technologies.

The SOC Analyst additionally works to support the Incident Response Team by conducting monitoring and analysis during incident management engagements.

Qualifications

Duties and Responsibilities :

  • Monitor, protect, and defend the enterprise perimeter against malicious network traffic.
  • Monitor, protect, and defend internal networks and hosts against ongoing and emerging threats.
  • Enrich monitoring logs with contextual operation data from functional areas correlate events and identify security issues, threats, and vulnerabilities
  • Conduct security event analysis and validation, triage validated incidents, perform initial containment where feasible, research incident and enrich incident case documentation, and escalate incident for further analysis, containment, and eradication.
  • Review and analyze threat intelligence information and proactively search application, system, network logs to hunt for and thwart relevant threats identified threats.
  • Prepare and perform shift handover briefing to communicate completed and pending activities, and relay situational awareness information.
  • Contribute to the development and maintenance of SOC Standard Operating Procedures (SOPs) and Concept of Operations (CONOPS) to establish and continuously improve organization operating knowledge base.
  • Participate in post-incident activities and contribute to lessons learned to improve security operations.
  • Provide support in preparation of management threat reports and briefings, and recommendations.
  • Provide sound technical recommendations that enable remediation of security issues.
  • Partner with security engineering to develop and refine SIEM correlation rules.
  • Utilize advanced threat models, SIEM use cases, and incident response playbooks.

Required Skills and Qualifications :

Bachelor’s degree from an accredited college or university with a major in computer science, information systems, engineering, business, or a related scientific or technical disciplines.

Master's Degree is preferred.

CompTIA CySA+ certification / or a CompTIA Security+ (or other relevant IAT Level II / III Certification) along with one of the following :

CCNA Cyber Ops

CCNA-Security

GCIA

GCIH

GICSP

Cloud+

SCYBER

PenTest+

  • Experience analyzing intrusion events such phishing emails, malware, privileges misuse, traffic indicating potential malicious activities such DoS / DDoS, brute force, data loss through exfiltration / inadvertent disclosure.
  • Applied experience of threat analysis model / frameworks such Cyber Kill Chain, MITRE ATT&CK, Diamond Model, Pyramid of Pain etc.
  • Working knowledge of advanced threat Tactics, Techniques and Procedures (TTPs).
  • Applied experience with network traffic analysis with tools like Wireshark
  • Applied experience with a variety of Opensource threat research tools / platforms such as Virus Total
  • Working knowledge of network and security architecture principles such as defense-in-depth
  • Experience with proprietary security protection / detections tools such as Firewall, Host and Network IDS / IPS, Anti-Virus, EDR, URL Filtering Gateways, Email Filtering Gateways, DLP tools, and SIEM tools such as Splunk etc.
  • Capable of working independently, establishing priorities and managing task completion within set SLAs
  • Able to communicate effectively through writing, speaking, and presenting to client technical representatives.
  • Team player capable of productively contributing to the client mission by supporting fellow teammates in a dynamic growing and changing environment.

Desired Skills and Qualifications :

  • Experience with mid-to-advance level malware analysis
  • Experience creating detailed queries and scripts, such as regular expressions, for log, event and correlation analysis.
  • Experience scripting in Python, PowerShell, VBScript

Min. Citizenship Status Required : US Citizen

Location : Crownsville, MD (100% onsite)

Shift : Day Shift

Physical Requirements : N / A

LI-MP1

Working at DMI

DMI is a diverse, prosperous, and rewarding place to work. Being part of the DMI family means we care about your wellbeing.

We offer a variety of perks and benefits that help meet various interests and needs, while still having the opportunity to work directly with a number of our award-winning, Fortune 1000 clients.

The following categories make up your DMI wellbeing :

  • Convenience / Concierge - Virtual visits through health insurance, pet insurance, commuter benefits, discount tickets for movies, travel, and many other items to provide convenience.
  • Development Annual performance management, continuing education, and tuition assistance, internal job opportunities along with career enrichment and advancement to help each employee with their professional and personal development.
  • Financial Generous 401k matches both pre-tax and post-tax (ROTH) contributions along with financial wellness education, EAP, Life Insurance and Disability help provide financial stability for each DMI employee.
  • Recognition Great achievements do not go unnoticed by DMI through Annual Awards ceremony, service anniversaries, peer-to-peer acknowledgment, employee referral bonuses.
  • Wellness Healthcare benefits, Wellness programs, Flu Shots, Biometric screenings, and several other wellness options.

Employees are valued for their talents and contributions. We all take pride in helping our customers achieve their goals, which in turn contributes to the overall success of the company.

The company does and will take affirmative action to employ and advance in employment individuals with disabilities and protected veterans, and to treat qualified individuals without discrimination based on their physical or mental disability or veteran status.

DMI is an Equal Opportunity Employer Minority / Female / Veterans / Disability. DMI maintains a drug-free workplace.

No Agencies Please

Applicants selected may be subject to a government security investigation and must meet eligibility requirements for access to classified information.

US citizenship may be required for some positions.

LI-CA1

30+ days ago
Related jobs
Promoted
DMI (Digital Management, Inc.)
Crownsville, Maryland

Security Operations Center (SOC) Analyst. The SOC Analyst executes and helps to create operational processes for consistent monitoring of client environments and should be familiar with varieties of security tools and technologies. The SOC Analyst additionally works to support the Incident Response ...

Promoted
DMI Mobile Enterprise Solutions
Crownsville, Maryland

Digital Forensics SOC Analyst III. Provide analysts Tier 3 support, systems, and network forensic investigation support for the Security Operations Center (SOC) activities. Provide SOC Analyst Tier 3 escalation support. Train SOC analysts on usage of SIEM tools (Splunk), and basic event analysis. ...

Otis College of Art and Design
Remote City, MD, USA
Remote

Under the direction of the Security Operations Center (SOC) Lead, the SOC Analyst will be responsible for monitoring, analysis, triage, and escalation of cyber events. Specialist, SOC Analyst, Cyber Operations. The SOC Analyst will also participate in Incident Response activities as necessary. At le...

Federal Reserve System
Remote, Maryland
Remote

The Federal Reserve System (FRS) National Incident Response Team (NIRT) has an immediate opening for an Intermediate SOC Analyst (Incident Response) position, reporting to a Senior Manager Information Security. This role will be a combination of SOC analyst (providing triage of potential security ev...

Otis College of Art and Design
Remote City, MD, USA
Remote

Under the direction of the Security Operations Center (SOC) Lead, the Senior SOC Analyst will be responsible for monitoring, analysis, triage, and escalation of cyber events. Manager, Senior SOC Analyst, Cyber Operations. The Senior SOC Analyst will also participate in Incident Response activities a...

DMI (Digital Management, LLC)
Crownsville, Maryland

Security Operations Center (SOC) Analyst. The SOC Analyst executes and helps to create operational processes for consistent monitoring of client environments and should be familiar with varieties of security tools and technologies. The SOC Analyst additionally works to support the Incident Response ...

TechnoGen Inc
Crownsville, Maryland

DigitalForensics SOC Analyst III. DigitalForensics SOC Analyst III. Provide SOC Analyst Tier 3escalation support. Train SOC analysts on usage of SIEM tools(Splunk) and basic event analysis. ...

Transcend Business Solutions
Crownsville, Maryland

Title: Digital Forensics SOC Analyst III. Digital Forensics SOC Analyst III. Provide analysts Tier 3 support, systems, and network forensic investigation support for the Security Operations Center (SOC) activities. Provide SOC Analyst Tier 3 escalation support. ...

EverWatch
Annapolis Junction, Maryland

We are looking for an experienced Security Operations Center (SOC) Tier II Analyst to improve monitoring strategies and analyze threats to safeguard infrastructure supporting global missions focused on seeking out and eliminating cyberspace threats to defend the United States and its Allies. You'll ...

Promoted
Accenture Federal Services
Annapolis Junction, Maryland

Our 13,000+ people are united in a shared purpose to pursue the limitless potential of technology and ingenuity for clients across defense, national security, public safety, civilian, and military health organizations. Develop software solutions by analyzing system performance standards, confer with...