Skip to content
  Tuesday 20 January 2026
Trending
July 16, 2025Lead Cybersecurity Intergrated Architect April 18, 2024F-35 Classified Cybersecurity Subcontract Management & Compliance February 7, 2025CISA Adds One Known Exploited Vulnerability to Catalog July 15, 2025Sr Dir, Chief of Staff – Cybersecurity November 16, 2024Unlock Essential Services & Commands: Your Ultimate Guide January 11, 2024Siemens Solid Edge | CISA October 25, 2024Cybersecurity Technical Lead April 19, 2024GSOC Cybersecurity Specialist October 16, 2023RomCom RAT Variant Targets Women Political Leaders October 25, 2023The Influence of Technology on Diverse Healthcare Professions
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Careers  Mid Cybersecurity Analyst- SOC
Careers

Mid Cybersecurity Analyst- SOC

SecuredyouadmSecuredyouadm—August 11, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Digital Assurance & Transparency – Cybersecurity Director

June 16, 2025

Cybersecurity Analyst

April 8, 2025

Cybersecurity Engineer Intern

November 18, 2024

IT Security Manager – Cybersecurity M&A and Governance

October 31, 2025

Type of Requisition: RegularClearance Level Must Currently Possess: OtherClearance Level Must Be Able to Obtain: NonePublic Trust/Other Required: MBI (T2)Job Family: Cyber SecurityJob Qualifications:Skills: Cyber Defense, Cybersecurity, SIEM ToolsCertifications: NoneExperience: 3 + years of related experienceUS Citizenship Required: YesJob Description:Mid Cybersecurity Analyst- SOCJob Description:

  • Lead the analysis and investigation of information security events (IDS/DLP/SIEM/etc.) in a 24X7 SOC environment to detect, verify, and respond swiftly to cyber threats and remove false positives.
  • Serve as a technical point of escalation and provide mentoring for junior Security Operations Center (SOC) analysts.
  • Responsible for investigating incidents, analyzing attack methods, researching new defense techniques and tools, developing security policy, and documenting procedures for SOC.
  • Familiar with malware analysis and other attack analysis to extract indicators of compromise. Perform data security event correlation between various systems.
  • Prepare reports, summaries, and other forms of communication that may be both internal and client-facing.
  • Maintain familiarity with industry trends and security best practices.
  • Ensure compliance with SLA, process adherence, and process improvisation to achieve operational objectives.

General Skills:

  • Strong knowledge of TCP/IP protocols, basic networking, etc.
  • Ability to parse/analyze network logs (proxy, firewall, antivirus, email, etc.)
  • PCAP analysis (Wireshark familiarity, Trellix)
  • IDS (know what an IDS is/does. Snort, Suricata, etc.)
  • Familiarity with typical attack/exploit techniques (OWASP top 10, what a command injection looks like, how to identify malicious code on a webpage, how to read obfuscated code etc.)
  • Significant expertise in SIEM (Splunk, ArcSight, Crowdstrike, etc.)
  • Threat Intelligence (Open source feeds, IOCs, Known APT TTPs, etc.)
  • Threat Hunting (Know what to look for, analyst mindset)
  • Scripting (Ideally Python, PowerShell, Bash)
  • Command line Interface
  • Linux (Just the basics necessary, should at least know concepts like what is root and basic directory structure)
  • Knowledge of Enterprise Windows configurations (Mainly Active Directory, how it works, why it’s essential to monitor/protect)
  • Written Communications (Analyst will be interacting with other departments in CTFC and often with those outside the org via email)

In addition, the following skills are a strong plus:

  • Working knowledge of web proxies, firewalls, HTTP status codes, proxy configuration, etc.
  • Ability to parse network logs to identify network anomalies/proxy issues
  • Expertise with open-source intelligence gathering tools like virustotal, joesandbox, robtex, whois, urlscan, etc.)
  • Attention to detail
  • Good Interpersonal skills (Can be very customer-facing at times, a large portion of our calls are for PERs, and there is an entire inbox dedicated to troubleshooting user complaints)
  • Basic understanding of HTML/javascript/how a web page works

Any of the following certifications are a plus:CISSP, ITIL, CEH, GIAC, GSEC, SANS, GCIH, SEC504, GCED, SEC501GDIT IS YOUR PLACE:● 401K with company match
● Comprehensive health and wellness packages
● Internal mobility team dedicated to helping you own your career
● Professional growth opportunities including paid education and certifications
● Cutting-edge technology you can learn from
● Rest and recharge with paid vacation and holidays **(remove if not eligible)**The likely salary range for this position is $102,000 – $138,000. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.Scheduled Weekly Hours: 40Travel Required: Less than 10%Telecommuting Options: HybridWork Location: Any Location / RemoteAdditional Work Locations: USA MD LanhamTotal Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. GDIT typically provides new employees with 15 days of paid leave per calendar year to be used for vacations, personal business, and illness and an additional 10 paid holidays per year. Paid leave and paid holidays are prorated based on the employee’s date of hire. The GDIT Paid Family Leave program provides a total of up to 160 hours of paid leave in a rolling 12 month period for eligible employees. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at.Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Read More

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

As technology continues to advance, the ways in which we interact with the world around us are constantly evolving. One of the most significant advancements in recent years is the development of virtual reality (VR) technology. VR allows users to immerse themselves in a computer-generated environment, experiencing sights and sounds as if they were actually there. This technology has the potential to revolutionize various industries, from entertainment and gaming to healthcare and education.

In the entertainment industry, VR has opened up new possibilities for creating immersive and interactive experiences. Movie studios and game developers are now exploring the use of VR to transport audiences into their worlds, allowing them to feel like they are part of the action. This technology has the potential to revolutionize the way we consume entertainment, blurring the lines between reality and fiction.

In the healthcare sector, VR is being used to provide innovative solutions for patient care and treatment. From virtual simulations for medical training to therapeutic applications for mental health, VR is proving to be a valuable tool for improving healthcare outcomes. Patients can now undergo virtual therapy sessions or explore calming environments to reduce anxiety and stress.

Education is another area where VR is making a significant impact. Teachers are using VR technology to create immersive learning experiences for students, allowing them to explore historical sites, conduct virtual experiments, or practice real-world skills in a safe and controlled environment. This interactive approach to education has the potential to engage students in ways that traditional methods cannot, making learning more engaging and effective.

Overall, the potential of VR technology is vast and far-reaching. As we continue to explore its capabilities, we can expect to see even more innovative applications in various industries. From entertainment and healthcare to education and beyond, VR has the power to transform the way we experience the world around us.
Shipboard C5I Cybersecurity Engineer, Subject Matter Expert
Related posts
  • Related posts
  • More from author
Careers

Cybersecurity Intern

January 19, 20260
Careers

Lead Cybersecurity Assessor

January 19, 20260
Careers

Cybersecurity Engineer

January 19, 20260
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Intern

January 19, 20260
Careers

Lead Cybersecurity Assessor

January 19, 20260
Careers

Cybersecurity Engineer

January 19, 20260
Careers

Director of Cybersecurity Architecture

January 19, 20260
Careers

Senior Consultant- Cybersecurity

January 19, 20260
Careers

Industrial Cybersecurity

January 19, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Intern
  • Lead Cybersecurity Assessor
  • Cybersecurity Engineer
  • Director of Cybersecurity Architecture
  • Senior Consultant- Cybersecurity

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures