Mid Level Incident Response Analyst - REMOTE

Washington, DC

Full Time Mid-level / Intermediate Clearance required USD 77K - 135K *

Job Description:

XOR Security is currently seeking talented Mid Level Incident Response Analyst for an exciting position supporting one of our premier clients. Our project is aimed at establishing cutting-edge techniques for network defense, identifying threats and detecting malicious activity using advanced toolsets. 

The ideal candidate will have hands-on experience as a SOC analyst performing Incident Response and Intrusion Detection on an operational Federal network.  The candidate will Monitor and analyze network traffic, Intrusion Detection Systems (IDS), security events and logs and provide a technical resource and escalation point for tier 1 analysts.  The candidate will perform incident response to investigate and resolve security incidents.  The candidate will need to be able to determine between false and true positives events, prioritizing them appropriately and see them through from end to end.  Additionally, the candidate will perform or review root cause analysis efforts following incident recovery.  The candidate will compose security alert notifications and other communications on behalf of the SOC.

In addition, the candidate will need to stay up to date with current vulnerabilities, attacks, and countermeasures.  The candidate will Develop follow-up action plans to resolve reportable issues and communicate with the other technologists to address security threats and incidents.  Also, the candidate will Regularly develop new use cases for automation and tuning of security tools.  The candidate will Define and create privacy and security reportable issues metrics and reports.  The candidate will need to contribute to security strategy and security posture by identifying security gaps, evaluate and implement enhancements.  The ideal candidate will possess a strong technical expertise of log and monitoring management systems, security event monitoring systems, network-based and host-based intrusion detection systems, firewall technologies, malware detection and enterprise-level antivirus solutions/systems, VPN technologies and encryptions standards


Washington D.C., USA


6am - 2pm or 10am - 6pm. Analyst should be flexible for both for potential rotation.

Skills and Qualifications:

Required Qualifications:

  • An industry technical certification such as GCIH
  • Experience with tools such as Active Directory, Cisco IOS, MS Server, ESA, WSA, Stealthwatch, AMP, Splunk, FortiSIEM, SNORT, Yara, IronPort, and Firepower.
  • Experience with deployment and documentation of enterprise project management and change management processes
  • Ability to identify solutions to potential network issues/embrace network simplification and strengthened security
  • Ability to conduct event triage and analysis and incident investigation
  • Three (3) years of experience in network defense environments

Desired Qualifications:

  • Understanding of command line scripting and implementation (e.g., Python, Powershell)
  • Ability to write new content/searches/scripts (e.g., Splunk dashboards, Splunk ES alerts, SNORT signatures, Python scripts, Powershell scripts)
  • Familiarity with Splunk Enterprise Security
  • Strong understanding of networking (TCP Flags, TCP Handshake, IP addressing, Firewalls, Proxy, IDS, IPS)
  • Ability to perform Netflow / packet capture (PCAP) analysis
  • Experience with cyber threat hunting
  • Bachelor’s Degree in Computer Science, Computer Engineering, Information Systems or equivalent experience

Closing Statement:

XOR Security offers a very competitive benefits package including health insurance coverage from the first day of employment, 401k with a vested company match, vacation and supplemental insurance benefits.

XOR Security is an Equal Opportunity Employer (EOE). M/F/D/V.

Citizenship Clearance Requirement
Applicants selected may be subject to a government security investigation and must meet eligibility requirements - US CITIZENSHIP and PUBLIC TRUST CLEARANCE REQUIRED.


* Salary range is an estimate based on our salary survey at salaries.infosec-jobs.com

Tags: Active Directory Automation C Clearance Clearance Required Computer Science Firewalls GCIH IDS Incident response Intrusion detection iOS IPS Malware Monitoring PCAP PowerShell Privacy Python Scripting Security strategy Snort Splunk Strategy VPN Vulnerabilities

Perks/benefits: 401(k) matching Flex hours Flex vacation Health care Team events

Regions: Remote/Anywhere North America
Country: United States
Job stats:  28  9  0
  • Share this job via
  • or

Other jobs like this

Explore more Cybersecurity career opportunities

Find open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Analysis, Cryptography, Digital Forensics and Cyber Security in general, filtered by job title or popular skill, toolset and products used.