SOC Analyst II

Foxhole TechnologyLeesburg, VA
11dOnsite

About The Position

Foxhole Technology provides robust cybersecurity and IT support capabilities for federal civilian and defense agencies. A recognized leader in navigating technology and security challenges, Foxhole delivers mission-focused innovations to answer evolving and complex needs. Our talented employee-owners provide agile, scalable services and solutions that solve operational gaps, operate critical systems, and protect and secure the enterprise – across the organization and around the world. Foxhole Technology is seeking a SOC Analyst (Tier 2) to join our growing team in support of Security Operations Center. The available shift is Day Shift A: Sunday-Tuesday and alternating Wednesdays from 7AM- 7PM. The ideal candidate will have extensive experience working in a network security environment, such as a Security Operations Center (SOC), and have an understanding of typical cybersecurity deliverables. The SOC Analyst provides: Initial response when an cyber incident is identified Remediation of incidents and escalation when necessary to Tier 3 support Initial assessment of the scope of the attack and affected systems Data collection for further analysis. Dedicated monitoring and analysis of cyber security events by use of SOC tools Event of Interest (EOI) handling and escalation as appropriate Incident Response generation and reporting IAW established procedures Processing of incident communications to include initial reporting, follow-ups, requests for information and resolution activity

Requirements

  • Minimum five (5) years experience
  • BS Degree or additional work experience substitution
  • Basic knowledge of cybersecurity best practices
  • Active DoD Secret Clearance
  • Think analytically, effective verbal and written communication skills, make decisions, observe/remember details, interpret data, concentrate on tasks, adjust to change, handle stress/emotions.
  • Regular attendance, maintain work schedule, attend meetings, meet deadlines, keyboard/type, handle confidential information, use math/calculations, stay organized, operate office equipment, may direct others.
  • May be exposed to dust/dirt, humidity, and noise

Nice To Haves

  • Security + Certification

Responsibilities

  • Initial response when an cyber incident is identified
  • Remediation of incidents and escalation when necessary to Tier 3 support
  • Initial assessment of the scope of the attack and affected systems
  • Data collection for further analysis.
  • Dedicated monitoring and analysis of cyber security events by use of SOC tools
  • Event of Interest (EOI) handling and escalation as appropriate
  • Incident Response generation and reporting IAW established procedures
  • Processing of incident communications to include initial reporting, follow-ups, requests for information and resolution activity
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service