Analyst 3 - Information Security

US-MN-St Paul
1 week ago
Requisition ID
# of Openings
Job Function
Information Security
Job Schedule
Regular Full-Time

Project/Position Introduction

MAXIMUS is a leading operator of government health and human services programs in the United States, United Kingdom, Canada, Australia and Saudi Arabia. The Company delivers business process services to improve the cost effectiveness, efficiency and quality of government-sponsored benefit programs, such as the Affordable Care Act, Medicaid, Medicare, Children’s Health Insurance Program (CHIP), Health Insurance BC (British Columbia), as well as welfare-to-work and child support programs around the globe. The Company’s primary customer base includes federal, provincial, state, county and municipal governments. Operating under its founding mission of Helping Government Serve the People®, MAXIMUS has more than 16,000 employees worldwide.


The Security Operations Center (SOC) Analyst is responsible for accurate and rapid response to security events as part of the rotational 24x7 operations of the SOC. Their objective is to manage, implement and monitor the strategic security monitoring and operation program to ensure that confidentiality, integrity, and availability of information owned, controlled or processed by the organization.


  • Understand a variety of network protocols including TCP/IP, UDP, DHCP, FTP, SFTP, ATM, SNMP, SMTP, SSH, SSL, VPN, RDP, HTTP, and HTTPS
  • Operate SEIM (Trustwave) consoles in order to monitor the environment for events of interest
  • Perform analysis of security logs in an attempt to detect unauthorized access
  • Use vulnerability assessment data to pinpoint potential points of attack
  • Document and contain security incidents detected on the network
  • Execute incident response process when a security incident has been declared
  • Participate in the creation, modification and maintenance of all SOC policies and procedures
  • Travel required up to 15% of the time
  • Other duties as assigned by management

The Ideal Candidate will Possess the Following Additional Education and Experience

  • Bachelor’s degree from an accrediated college or unviersity required; in Computer Science, Mathematics, Engineering, or equivalent field of study; or 5 years’ comparable work experience in lieu of degree
  • Experience on a Computer Incident Response Team (CIRT)
  • Experience participating in Tier 1-3 SOC Teams including vulnerability management, incident handling and forensics
  • Research external trusted intelligence sources and leverage knowledge to detect events of interest
  • Understand cyber-attack methods such as SQL Injection and Cross Site Scripting attacks (XSS)
  • Strong background in security operations, process, solutions and technologies
  • Demonstrated written and oral communication skills with the ability to effectively communicate with information technology professionals as well as senior management and auditors, assessors, and consultants
  • Demonstrated personal integrity, the ability to professionally handle confidential matters and exhibit the appropriate level of judgment and decision making commensurate with the position and responsibilities
  • Demonstrated initiative, dependability, and ability to work with little supervision
  • Results driven individual who can manage assignments based on criticality, in a timely and professional manner

Preferred Qaulifications

  • Preferred Certifications: ECIH, GCIA, GCIH, or similar

  • Experience mitigating and addressing threat vectors including Advanced Persistent Threat (ADT), Distributed Denial of Service (DDoS), Phishing, Malicious Payloads, Malware, etc.

    2-4 years’ experience in analyzing security logs generated by Intrusion Detection/Prevention Systems (IDS/IPS), firewalls, Web Application Firewalls (WAF’s), Anti-Virus, and/or other security logging sources. Experience performing security analysis utilizing Security Incident and Event Management (SIEM) technologies.

    Possess a strong understanding of network communications protocols: (/IP, HTTP, DNS, and TLS. Experience with static and dynamic malware analysis. Experience writing custom protocol decoders. Possess an in-depth understanding of Windows system internals. Familiarity with Remote Access Tools and other network attacker tools.

    Ability to apply formal intelligence analysis methods, develop hypothesis, prove/disprove relationships, defend the analysis, and apply attribution to cyber threat activity

    Knowledge of hacker methodologies and tactics, system vulnerabilities and ley indicators of attacks and exploits

    Working knowledge of LINUX, Windows, and Network Operating Systems

  • Familiarity with industry-standard frameworks (NIST, ISO, PCI, etc.)

EEO Statement

A committed and diverse workforce is our most important resource.

MAXIMUS is an Affirmative Action/Equal Opportunity Employer.

MAXIMUS provides equal employment opportunities to all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status or disabled status.


Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed

Need help finding the right job?

We can recommend jobs specifically for you! Click here to get started.