An Important Message about Exelon Recruitment during COVID-19

We hope that you and your loved ones are managing through this challenging and uncertain time. The COVID-19 pandemic has demanded unprecedented changes to our daily lives. That said, what hasn’t changed for us is the vital work we do, and our commitment to ensuring the safety of our candidates, employees, customers, and communities. While our hiring process looks a bit different today, with 100 percent virtual interviewing and other solutions in place to facilitate proper social distancing, we remain focused on powering possibilities for new talent who are ready to join us in making a difference. As always, you can find our available opportunities here. We truly appreciate your continued interest in opportunities with Exelon and our family of companies.

Cyber Defense Analyst

This job posting is no longer active.

Location: OWINGS MILLS, MD, United States
Organization: Exelon Business Servcs Co, LLC
Job ID: 226796
Date Posted: Jul 5, 2020

Share: mail

Job Description


At Exelon, we've got a place for you!

Join the nation's leading competitive energy provider, with one of the largest electricity generation portfolios and retail customer bases in the country. You will be part of a family of companies that strives for the highest standards of power generation, competitive energy sales, and energy delivery. Our team of outstanding professionals is focused on performance, thought leadership, innovation, and the power of ideas that come from a diverse and inclusive workforce.

Exelon will provide you the tools and resources you need to design, build and enhance a successful career. We are also dedicated to motivating the success of our employees through competitive base salary, incentives, and health and retirement benefits.

Join Exelon and share your passion at a forward-thinking Fortune 100 company. Establish yourself in a place where you can truly shine and create a brighter, more sustainable tomorrow. Energize your career at Exelon!


Perform the Security Monitoring process and escalate relevant issues to the Security Monitoring Team Lead. #CD# Identify potential
security incidents and forward to the Incident Handling &#CD# Response team for analysis and remediation as appopriate.


- Complete Cyber Monitoring and Incident Response Operations Playbook/Checklist activities including, but not limited to: log
review, vulnerability management activities, management report scheduling &#CD# running, alert analysis, filter modifications &#CD# escalation follow up activity status #CD# 35

- Develop, tune, and maintain tools to automate analysis capabilities for network-based, host-based and log-based security event analysis. #CD# Create signatures, rulesets, and content analysis definitions from various intelligence sources for a variety of security detection capabilities #CD# 25

- Organize and maintain documentation of detection capabilities, alert definitions, policy configurations, and tool rulesets. #CD# 10
- Maintain adherence to Corporate Security Operations Center standards, policies &#CD# procedures#CD# 10

- Remain up-to-date on the latest security information in order to validate the security analysis &#CD# identification capabilities of the security operations technologies#CD# 10

- Participate in efforts to analyze &#CD# define security filters &#CD# rules for a variety of security parameters#CD# 10



- Bachelors Degree in Computer Science or a related 4-year technical degree (or a minimum 4 years of IT experience)

- Minimum 3 years IT Security experience

- Core Technical: Intrusion Detection, Netflow Analysis, Log Analysis, Rule/Signature/Content Development, Programming or scripting experience required.

- General: Must exhibit understanding and application of the principles of Network Security Monitoring (NSM). #CD# Ability to analyze log data, netflow data, alert data, network traffic and other data sources to validate security events. Ability to create signatures and detection content in IDS, SIEM and Log analysis platforms. Ability to consume, comprehend, utilize and create indicators of compromise. Ability to tune detection tools for accuracy. Execute on intelligence-driven detection capabilities.
Perform daily analysis of detection reports and alerts. #CD# Maintain tools, scripts and applications for detection and automation capabilities. #CD# Identify opportunities for capability and efficiency improvements. #CD# Ability to conduct network and host analysis of compromised and baseline systems to identify anomalies. #CD# Exhibit understanding of tools, tactics and procedures (TTP) of malicious actors such as hacktivist groups, cybercrime organizations and advanced persistent threats. #CD# Identify and report on detection trends. Comprehensive knowledge of common networking protocols: HTTP, DNS, DHCP, SMTP, NTP, SSH, FTP.


- General Info Security: Intelligence - Driven Detection, Security Principles, Threat Lifecycle Management, Incident Management &#CD# Lifecycle, Platform Analysis, #CD# Forensics &#CD# Investigations, NSM, DFIR

- Cyber SOC Process Management: Overall Process Design &#CD# SOC Threat Management, Teamwork, Collaboration and independent contributions

- Malware Analysis experience preferred.


Provide near real-time monitoring of business centric risks to Exelon by identifying potential security incidents from security alerts.

Exelon is proud to be an equal opportunity employer and employees or applicants will receive consideration for employment without regard to: age, color, disability, gender, national origin, race, religion, sexual orientation, gender identity, protected veteran status, or any other classification protected by federal, state, or local law.

VEVRAA Federal Contractor

EEO is the Law Poster

Share: mail

Frequent Job Searches

Recently Viewed Jobs

Most Recent Job Searches

Relevant Jobs

Personalize this site