SOC Analyst II

Foxhole Technology, Inc.Smyrna, GA
81d

About The Position

Foxhole Technology is seeking an experienced SOC Analyst II as part of a team of information assurance professionals in support of a critical Government program. The position involves supporting the Customer's 24x7x365 on-premise Security Operations capability, managing cybersecurity risks across systems, assets, data, and capabilities. This service is designed to detect and mitigate unauthorized use of Customer materials, ensuring that intellectual property is safeguarded against piracy and theft.

Requirements

  • Active DoD Secret security clearance
  • Between 3-5 years of progressive incident response experience
  • DoD IAT II required certification/s (one of the following): CCNA-Security, CySA+ (CSA+), GICSP, GSEC, Security+ CE, CND, SSCP
  • CSSP-A required certification/s (one of the following): CEH, GCIA, GCIH, CySA+

Responsibilities

  • Support Customer 24x7x365 on-premise Security Operations capability managing cybersecurity risks.
  • Detect and mitigate unauthorized use of materials.
  • Identify vulnerabilities, prevent content exploitation, and reduce potential legal and financial risks.
  • Continuously monitor malware detection software tools.
  • Monitor network-based security sensors for anomalies and unauthorized activities.
  • Monitor security controls and initiate event/incident handling processes.
  • Provide summary reports on collaborative efforts with DoD and non-DoD organizations, including recommendations to improve malware protection strategies.
  • Provide quarterly Cybersecurity reports on the security posture of DCMA information systems.
  • Integrate Zero Trust component logs and events into existing SIEM/SOAR platforms.
  • Develop custom dashboards, alerts, and reports to monitor policy enforcement and detect anomalous behavior.
  • Develop and implement SOAR playbooks for automated response to violations or detected threats.
  • Document and address deficiencies noted through detection activities, specifically regarding tool misconfigurations, policy gaps, or architectural weaknesses.
  • Provide technical knowledge and analysis of security incident responses.
  • Perform forensic analysis of devices involved in incidents.
  • Investigate potential intrusions and security events to contain and mitigate incidents.
  • Research cyber-attacks, malware, and threat actors to determine potential impact and develop remediation guidance.
  • Effectively communicate incident response activities.
  • Maintain the confidentiality and integrity of the data within SIEM.
  • Provide timely and accurate reports to management.
  • Collaborate with vendors to ensure proper best practices are enforced and recommendations are delivered.
  • Produce high-quality written and verbal communications, recommendations, and findings to management in a timely manner.
  • Attend focus groups, trainings, industry conferences, and skills enhancement opportunities.
  • Provide timely escalation of events to appropriate teams and external parties.
  • Possess and apply a comprehensive knowledge across key tasks and high impact assignments.
  • Evaluate performance results and recommend major changes affecting short-term project growth and success.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service