×
Register Here to Apply for Jobs or Post Jobs. X

SOC Analyst Mid

Job in Milford Mill, Baltimore County, Maryland, USA
Listing for: Electronic Consulting Services, Inc (ECS Federal)
Full Time position
Listed on 2026-03-13
Job specializations:
  • IT/Tech
    Cybersecurity, Network Security
Salary/Wage Range or Industry Benchmark: 69099 - 84454 USD Yearly USD 69099.00 84454.00 YEAR
Job Description & How to Apply Below
Job Description

ECS is seeking a SOC Analyst Mi d to work in our Windsor Mill office.

Position Responsibilities:

Perform hunting for malicious activity across the network and digital assets

Respond to computer security incidents and conduct threat analysis

Identify and act on malicious or anomalous activity

Conducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the network

Perform detailed investigation and response activities for potential security incidents

Provide accurate and priority driven analysis on cyber activity/threats

Perform payload analysis of network packets

Recommends implementation of countermeasures or mitigating controls

Ensures all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environment

Collaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activity

Mentor junior staff in cybersecurity techniques and processes

Create and continuously improve standard operating procedures used by the SOC

Resolve or coordinate the resolution of cyber security events

Monitor incoming event queues for potential security incidents

Create, manage, and dispatch incident tickets

Monitor external event sources for security intelligence and actionable incidents

Maintain incident logs with relevant activity

Document investigation results, ensuring relevant details are passed to SOC Lead, Incident Management team and stakeholders

Participate in root cause analysis or lessons learned sessions

Salary Range: $69,099.00 - $84,454.00
General Description of Benefits:
Benefits Link

Required Skills

Job Requirements:

Working knowledge with US-CERT Federal Incident Notification Guidelines

4 years of Information Technology experience, with at least 2 years of experience in information security working within security operations

Working knowledge of Splunk Enterprise, Enterprise Security, and SOAR products

Working knowledge of Crowd Strike, Trend Micro and McAfee host-based solutions

Knowledge of log, network, and system forensic investigation techniques

Significant experience performing analysis of log files from a variety of sources, including individual host logs, network traffic logs, firewall logs, or intrusion prevention/detection logs

Experience conducting intelligence driven defense utilizing the MITRE ATT&CK framework and Cyber Kill Chain (CKC)

Diverse knowledge base of operating systems, network protocols, system administration, and security technologies

Knowledge of TCP/IP Networking and the OSI model

Experience creating actionable content for a diverse range of commercial security tools and/or SIEM technologies

Significant experience monitoring threats via SIEM console

Excellent problem solving, critical thinking, and analytical skills with the ability to de-construct problems

Strong customer service skills and decision-making skills

Ability to develop working knowledge of client infrastructure

Certifications/Licenses:
One or more of the following industry standard certifications:

Bachelor's degree in Computer Science or related field or equivalent work experience

Certified Information Systems Security Professional or Associate

Formal IT Security/Network Certification such as SANS GIAC Certified Intrusion Analyst (GCIA), SANS GIAC Network Forensic Analyst (GNFA) or SANS GIAC Certified Incident Handler (GCIH)

Desired Skills

Additional

Experience Preferred:

3+ years' experience in SOC/CIRT or 1-year specific experience as a Lead SOC Analyst

Experience at the Centers for Medicare and Medicaid Services (CMS) or U.S. Department of Health and Human Services (HHS) or previous SOC/CIRT experience at a federal agency similar in size, scope, and complexity

EC Council Certified Ethical Hacker (CEH)

Experience with Elastic, Snowflake (or other Security Data Lake), and Akamai WAF

Significant experience with packet analysis (Wireshark) and malware analysis

ECS is an equal opportunity employer and does not discriminate or allow discrimination on the basis any characteristic protected by law. All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, or local jurisdiction law.

ECS is a leading mid-sized provider of technology services to the United States Federal Government. We are focused on people, values and purpose. Every day, our 3800+ employees focus on providing their technical talent to support the Federal Agencies and Departments of the US Government to serve, protect and defend the American People.
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary