MAXIMUS, Inc.-posted 18 days ago
Full-time • Entry Level
Onsite • Washington, DC
5,001-10,000 employees
Administrative and Support Services

Maximus is currently hiring for a Junior Cyber Defense Incident Responder for an onsite position in Washington, DC (near Union Station). Maximus TCS (Technology and Consulting Services) Internal Job Profile Code: TCS055, T1, Band 4 Job-Specific Essential Duties and Responsibilities: Respond to cyber incidents, including handling SOC IR phone calls and emails from clients and customer points of contact. Support detection and incident handling & response, of cyber threats affecting internal and external client networks. Maintain knowledge of current vulnerabilities, response, and mitigation strategies used in the cybersecurity operation center. Analyze and report cyber threats, assisting in deterring, identifying, monitoring, investigating, and analyzing computer network intrusions. Follow Federal IRP, SOC SOPs, and other documentation procedures to work effectively while focusing on process improvement. Possess knowledge of multiple technologies and system types. Articulate the incident response lifecycle clearly.

  • Respond to cyber incidents, including handling SOC IR phone calls and emails from clients and customer points of contact.
  • Support detection and incident handling & response, of cyber threats affecting internal and external client networks.
  • Maintain knowledge of current vulnerabilities, response, and mitigation strategies used in the cybersecurity operation center.
  • Analyze and report cyber threats, assisting in deterring, identifying, monitoring, investigating, and analyzing computer network intrusions.
  • Follow Federal IRP, SOC SOPs, and other documentation procedures to work effectively while focusing on process improvement.
  • Possess knowledge of multiple technologies and system types.
  • Articulate the incident response lifecycle clearly.
  • Bachelor's degree with 1-3 years of experience in cyber defense incident handling (or equivalent experience).
  • 1+ years of SOC experience with direct experience in incident handling and response activities.
  • Knowledge of security tools and the security stack.
  • Hands-on experience with Splunk SIEM, including at least one year as a cybersecurity or security operations analyst.
  • Basic understanding of network protocols and packet analysis tools.
  • Certification: Security+ or equivalent. Splunk Fundamentals I & II preferred.
  • Clearance: Ability to obtain and maintain a Public Trust clearance
  • Splunk Fundamentals I & II preferred.
  • health insurance coverage
  • life and disability insurance
  • a retirement savings plan
  • paid holidays
  • paid time off
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service