SOC Incident Response Analyst I Job at General Dynamics Information Technology, Lanham, MD

cDZ4TFR2cWR3OVJCdGUvcDRyNE9JY0VYTWc9PQ==
  • General Dynamics Information Technology
  • Lanham, MD

Job Description

Public Trust: MBI (T2)
Requisition Type: Regular
Your Impact

Own your opportunity to work alongside federal civilian agencies. Make an impact by providing services that help the government ensure the well being of U.S. citizens.

Job Description

We are seeking a motivated Incident Response SOC Analyst I to join our SOC team. In this entry-to-mid-level role, you will work under the guidance of senior analysts to monitor security telemetry, triage alerts, perform initial investigations, and assist with containment and remediation activities. This is an excellent opportunity to grow your skills in incident response, threat hunting, forensics, and security tooling.

***This is a hybrid position, candidates must reside in the DC metropolitan area and be open to working either day or evening shifts***

Key Responsibilities
Monitor and triage security alerts from SIEM, EDR, IDS/IPS, and other security telemetry sources.
Conduct initial incident validation, categorize incidents, and determine severity levels.
Perform basic to intermediate incident response activities, including containment, eradication, and recovery steps under supervision.
Gather and preserve digital evidence following standard operating procedures and chain-of-custody requirements.
Collaborate with IT and security teams to apply mitigations, patches, and configuration changes.
Document investigation steps, findings, and remediation actions in incident tickets.
Participate in post-incident reviews (PIR) and help develop lessons learned.
Respond to on-call rotations as required.
Expand knowledge of MITRE ATT&CK, common attack techniques, and security best practices.
Assist with monitoring and improving SOC processes, playbooks, and runbooks.

Required Qualifications

Bachelor’s degree in Computer Science, Information Security, Cybersecurity, or a related field

Minimum 1 year of professional experience in cyber incident response
Foundational knowledge of cyber security concepts, such as incident handling lifecycle, threat intelligence, and basic forensics.
Familiarity with security tools (SIEM, EDR, SOAR, threat intel feeds) and basic incident response workflows.

Hands-on experience with SIEM (e.g., Splunk, QRadar, ArcSight), EDR (e.g., CrowdStrike, Defender, SentinelOne), and basic SOAR concepts.
Experience with incident response tooling, digital forensics, and evidence handling.
Understanding of networking fundamentals (TCP/IP, DNS, VPNs, firewalls).
Strong analytical and problem-solving skills with a structured, methodical approach.
Excellent written and verbal communication; ability to produce clear incident reports and documentation.
Ability to work in a fast-paced environment and participate in on-call rotations (as needed).
Commitment to continuous learning and professional growth in cybersecurity.

Preferred Qualifications

Relevant certifications (e.g., CompTIA Security+, CEH, SANS GCIH, GIAC GCIA, or equivalent).
Knowledge of MITRE ATT&CK framework and common attacker techniques.
Familiarity with cloud security concepts (AWS/Azure/GCP) and cloud incident response considerations.
Scripting or automation skills (PowerShell, Python, Bash) a plus.

GDIT IS YOUR PLACE
At GDIT, the mission is our purpose, and our people are at the center of everything we do.
● Growth: AI-powered career tool that identifies career steps and learning opportunities
● Support: An internal mobility team focused on helping you achieve your career goals
● Rewards: Comprehensive benefits and wellness packages, 401K with company match, and competitive pay and paid time off

● Community: Award-winning culture of innovation and a military-friendly workplace

OWN YOUR OPPORTUNITY
Explore a career in cyber at GDIT and you’ll find endless opportunities to grow alongside colleagues who share your focus on defending and protecting what matters.

Work Requirements

Years of Experience

1 + years of related experience

* may vary based on technical training, certification(s), or degree

Certification

Travel Required

Less than 10%

Citizenship

U.S. Citizenship Required

Job Tags

Day shift, Afternoon shift,

Similar Jobs

Cognizant

Junior Python Developer Job at Cognizant

 ...are looking for an opportunity with these skills and expertise, here is the ideal opportunity for you! We are seeking a Junior Python Developer with 2-5 12 years of expertise to join our team. Responsibilities As a Junior Java/Python Developer, you will support... 

Cohen Law Group

Legal Intern Job at Cohen Law Group

 ...the top law firms to work for in the Orlando metro area. Responsibilities/Skills Willing to work hard and take instruction from Legal administrators, and attorneys Update spreadsheets, databases, case management software, andclient information Communicate... 

Acara Solutions

Sr. Manufacturing Engineering Manager (Aerospace/Space) Job at Acara Solutions

 ...Acara Solutions has been providing aerospace firms nationally with our staffing services for over 65 years. Our national/international...  .../ space client in Burbank, CA has an opening for a Sr. Manufacturing Engineering Manager. This is a direct employee position with... 

Windermere Real Estate

Real Estate Agent Job at Windermere Real Estate

 ...Welcome to Windermere Real Estate - where being a Real Estate Agent is more than just a job, it's a true calling. We believe in going above and beyond for our clients and communities, elevating and humanizing real estate every single day. We are the relationship heroes... 

START Center for Cancer Research

In Vivo Research Assistant I Job at START Center for Cancer Research

 ...The START Center for Cancer Research (START) is the worlds largest early phase site network, fully dedicated to oncology clinical...  ...medical history. We are hiring a motivated In Vivo Research Assistant I. Under direct supervision of the supervisor, this position involves...