SOC Tier 3 Analyst
Job
ECS Federal, LLC
Portland, OR (In Person)
Full-Time
Review key factors to help you decide if the role fits your goals.
Pay Growth
?
out of 5
Not enough data
Not enough info to score pay or growth
Job Security
?
out of 5
Not enough data
Calculating job security score...
Total Score
83
out of 100
Average of individual scores
Skill Insights
Compare your current skills to what this opportunity needs—we'll show you what you already have and what could strengthen your application.
Job Description
Everforth ECS is seeking a SOC Tier 3 Analystto work in our Portland, ORoffice.
The SOC Analyst 3 supports the organization's security operations by leading complex incident analysis,validatingadvanced investigative findings, coordinating technical response actions, improving detection effectiveness, and mentoring lower-tier analysts. This role is the senior technical analysis and escalation tier within the SOC Analyst role family.
The ideal candidate has advanced SOC, incident response, and detection-analysis experience; understands adversary tradecraft and enterprise security architecture; and can coordinate complex technical investigations while partnering with SOC leadership, threat hunting, threat intelligence, forensics, Splunk engineering, security engineering, and program stakeholders.
Key ResponsibilitiesAdvanced Incident Analysis & Escalation LeadershipLead analysis of complex, high-impact, multi-stage, or ambiguous security incidents across enterprise systems, cloud environments, identity platforms, endpoints, networks, and applications.
Validate incident severity, scope, attack path, affected assets, affected accounts,likely rootcause, and potential operational or business impact.
Review and resolve escalated findings from SOC Analyst 1 and SOC Analyst 2, including disputed severity, inconclusive evidence, or multi-source correlation challenges.
Provide technical facts, risk context, and recommended response priorities to SOC leadership for major incident handling and stakeholder communication.
Technical Response CoordinationCoordinate complex containment, eradication, and recovery support with Security Engineer, Senior Engineer, system owners, incident responders, and other technical teams.
Define evidence collection requirements and coordinate handoff to Forensics Lead or Forensics Mid when formal acquisition, preservation, chain of custody, or deep forensic analysis isrequired.
Guideinvestigation strategy, timeline development, technical response sequencing, and escalation decisions for complex incidents.
Maintain alignment with approved incident response plans, playbooks, evidence-handling expectations, and leadership direction.
Detection Effectiveness & Analytic ImprovementAnalyze adversary behaviors, attack patterns, vulnerabilities, threat intelligence, control gaps, and recurring incident trends to improve detection and response effectiveness.
Define analytic requirements andvalidatecorrelation rules, alert logic, dashboards, use cases, and response playbooks for operational effectiveness.
Map complexobservedbehaviors to MITRE ATT&CK and other applicable threat models to support analytic improvement and stakeholder reporting.
Coordinate with SOC Threat Hunter to convert hunt findings into operational detections and with Senior Splunk Engineer or Splunk Architect/Lead for technical implementation.
Reporting, Briefings & Knowledge TransferPrepare or review complex incident summaries, technical timelines, investigation narratives, after-action inputs, and lessons-learned content.
Communicate complex technical findings in clear operational, business, and risk language for SOC leadership, program stakeholders, and technical teams.
Provide technical input to SOC Technical Writer for SOPs, playbooks, knowledge articles, and formal documentation products.
Mentor SOC Analyst 1 and SOC Analyst 2 personnel through escalation review, coaching, analytic guidance, and quality feedback.
Governance, Quality & Continuous ImprovementLead or support detection reviews, tabletop exercises, incident retrospectives, process assessments, and quality improvement activities.
Identifyrecurring gaps in telemetry, tools, controls, workflows, documentation, or analyst training and coordinate corrective action requirements with theappropriate owner.
Stay current with evolving cyber threats, vulnerabilities, adversary tradecraft, detection techniques, and security operations best practices.
Translate lessons learned and threat developments into improved detections, procedures, escalation criteria, and analyst enablement materials.5+ years of experience in SOC operations, incident response, detection engineering support, threat analysis, or advanced cybersecurity operations.
Advanced experience using SIEM, EDR, log analysis, case management, and cross-tool correlation to investigate complex security incidents.
Strong understanding of adversary tradecraft, MITRE ATT&CK, incident response lifecycle activities, evidence handling, detection logic, and enterprise security architecture.
Experience leading complex investigations,validatingtechnical findings, defining response priorities, and coordinating technical response across multiple teams.
Experience developing orvalidatingdetection requirements, alert logic, analytic coverage, investigation workflows, or response playbooks.
Strong written and verbal communication skills, including the ability to brief technical findings and mentor lower-tier analysts.
Please Note:
This position is contingent upon contract award.The SOC Analyst 3 supports the organization's security operations by leading complex incident analysis,validatingadvanced investigative findings, coordinating technical response actions, improving detection effectiveness, and mentoring lower-tier analysts. This role is the senior technical analysis and escalation tier within the SOC Analyst role family.
The ideal candidate has advanced SOC, incident response, and detection-analysis experience; understands adversary tradecraft and enterprise security architecture; and can coordinate complex technical investigations while partnering with SOC leadership, threat hunting, threat intelligence, forensics, Splunk engineering, security engineering, and program stakeholders.
Key ResponsibilitiesAdvanced Incident Analysis & Escalation LeadershipLead analysis of complex, high-impact, multi-stage, or ambiguous security incidents across enterprise systems, cloud environments, identity platforms, endpoints, networks, and applications.
Validate incident severity, scope, attack path, affected assets, affected accounts,likely rootcause, and potential operational or business impact.
Review and resolve escalated findings from SOC Analyst 1 and SOC Analyst 2, including disputed severity, inconclusive evidence, or multi-source correlation challenges.
Provide technical facts, risk context, and recommended response priorities to SOC leadership for major incident handling and stakeholder communication.
Technical Response CoordinationCoordinate complex containment, eradication, and recovery support with Security Engineer, Senior Engineer, system owners, incident responders, and other technical teams.
Define evidence collection requirements and coordinate handoff to Forensics Lead or Forensics Mid when formal acquisition, preservation, chain of custody, or deep forensic analysis isrequired.
Guideinvestigation strategy, timeline development, technical response sequencing, and escalation decisions for complex incidents.
Maintain alignment with approved incident response plans, playbooks, evidence-handling expectations, and leadership direction.
Detection Effectiveness & Analytic ImprovementAnalyze adversary behaviors, attack patterns, vulnerabilities, threat intelligence, control gaps, and recurring incident trends to improve detection and response effectiveness.
Define analytic requirements andvalidatecorrelation rules, alert logic, dashboards, use cases, and response playbooks for operational effectiveness.
Map complexobservedbehaviors to MITRE ATT&CK and other applicable threat models to support analytic improvement and stakeholder reporting.
Coordinate with SOC Threat Hunter to convert hunt findings into operational detections and with Senior Splunk Engineer or Splunk Architect/Lead for technical implementation.
Reporting, Briefings & Knowledge TransferPrepare or review complex incident summaries, technical timelines, investigation narratives, after-action inputs, and lessons-learned content.
Communicate complex technical findings in clear operational, business, and risk language for SOC leadership, program stakeholders, and technical teams.
Provide technical input to SOC Technical Writer for SOPs, playbooks, knowledge articles, and formal documentation products.
Mentor SOC Analyst 1 and SOC Analyst 2 personnel through escalation review, coaching, analytic guidance, and quality feedback.
Governance, Quality & Continuous ImprovementLead or support detection reviews, tabletop exercises, incident retrospectives, process assessments, and quality improvement activities.
Identifyrecurring gaps in telemetry, tools, controls, workflows, documentation, or analyst training and coordinate corrective action requirements with theappropriate owner.
Stay current with evolving cyber threats, vulnerabilities, adversary tradecraft, detection techniques, and security operations best practices.
Translate lessons learned and threat developments into improved detections, procedures, escalation criteria, and analyst enablement materials.5+ years of experience in SOC operations, incident response, detection engineering support, threat analysis, or advanced cybersecurity operations.
Advanced experience using SIEM, EDR, log analysis, case management, and cross-tool correlation to investigate complex security incidents.
Strong understanding of adversary tradecraft, MITRE ATT&CK, incident response lifecycle activities, evidence handling, detection logic, and enterprise security architecture.
Experience leading complex investigations,validatingtechnical findings, defining response priorities, and coordinating technical response across multiple teams.
Experience developing orvalidatingdetection requirements, alert logic, analytic coverage, investigation workflows, or response playbooks.
Strong written and verbal communication skills, including the ability to brief technical findings and mentor lower-tier analysts.
Similar remote jobs
Emory University
Atlanta, GA
Posted1 day ago
Updated43 minutes ago
VIVA USA INC
Posted1 day ago
Updated43 minutes ago
Similar jobs in Portland, OR
Accountable Healthcare Staffing
Portland, OR
Posted1 day ago
Updated43 minutes ago
Jacobs
Portland, OR
Posted1 day ago
Updated43 minutes ago
Similar jobs in Oregon
Accountable Healthcare Staffing
Portland, OR
Posted1 day ago
Updated43 minutes ago
Equip
Oregon
Posted1 day ago
Updated43 minutes ago