Back to jobs
E

SOC Tier 3 Analyst

905 NE 11th Ave -ABDPosted Today

Job Description

Everforth ECS is seeking a SOC Tier 3 Analyst to work in our Portland, OR office. Please Note: This position is contingent upon contract award.

 

The SOC Analyst 3 supports the organization's security operations by leading complex incident analysis, validating advanced investigative findings, coordinating technical response actions, improving detection effectiveness, and mentoring lower-tier analysts. This role is the senior technical analysis and escalation tier within the SOC Analyst role family. 

The ideal candidate has advanced SOC, incident response, and detection-analysis experience; understands adversary tradecraft and enterprise security architecture; and can coordinate complex technical investigations while partnering with SOC leadership, threat hunting, threat intelligence, forensics, Splunk engineering, security engineering, and program stakeholders. 

 

Key Responsibilities 

Advanced Incident Analysis & Escalation Leadership 

  • Lead analysis of complex, high-impact, multi-stage, or ambiguous security incidents across enterprise systems, cloud environments, identity platforms, endpoints, networks, and applications. 
  • Validate incident severity, scope, attack path, affected assets, affected accounts, likely root cause, and potential operational or business impact. 
  • Review and resolve escalated findings from SOC Analyst 1 and SOC Analyst 2, including disputed severity, inconclusive evidence, or multi-source correlation challenges. 
  • Provide technical facts, risk context, and recommended response priorities to SOC leadership for major incident handling and stakeholder communication. 

Technical Response Coordination 

  • Coordinate complex containment, eradication, and recovery support with Security Engineer, Senior Engineer, system owners, incident responders, and other technical teams. 
  • Define evidence collection requirements and coordinate handoff to Forensics Lead or Forensics Mid when formal acquisition, preservation, chain of custody, or deep forensic analysis is required. 
  • Guide investigation strategy, timeline development, technical response sequencing, and escalation decisions for complex incidents. 
  • Maintain alignment with approved incident response plans, playbooks, evidence-handling expectations, and leadership direction. 

Detection Effectiveness & Analytic Improvement 

  • Analyze adversary behaviors, attack patterns, vulnerabilities, threat intelligence, control gaps, and recurring incident trends to improve detection and response effectiveness. 
  • Define analytic requirements and validate correlation rules, alert logic, dashboards, use cases, and response playbooks for operational effectiveness. 
  • Map complex observed behaviors to MITRE ATT&CK and other applicable threat models to support analytic improvement and stakeholder reporting. 
  • Coordinate with SOC Threat Hunter to convert hunt findings into operational detections and with Senior Splunk Engineer or Splunk Architect/Lead for technical implementation. 

Reporting, Briefings & Knowledge Transfer 

  • Prepare or review complex incident summaries, technical timelines, investigation narratives, after-action inputs, and lessons-learned content. 
  • Communicate complex technical findings in clear operational, business, and risk language for SOC leadership, program stakeholders, and technical teams. 
  • Provide technical input to SOC Technical Writer for SOPs, playbooks, knowledge articles, and formal documentation products. 
  • Mentor SOC Analyst 1 and SOC Analyst 2 personnel through escalation review, coaching, analytic guidance, and quality feedback. 

Governance, Quality & Continuous Improvement 

  • Lead or support detection reviews, tabletop exercises, incident retrospectives, process assessments, and quality improvement activities. 
  • Identify recurring gaps in telemetry, tools, controls, workflows, documentation, or analyst training and coordinate corrective action requirements with the appropriate owner. 
  • Stay current with evolving cyber threats, vulnerabilities, adversary tradecraft, detection techniques, and security operations best practices. 
  • Translate lessons learned and threat developments into improved detections, procedures, escalation criteria, and analyst enablement materials. 

See Your Match Score

Sign up and Renata will show you how this job matches your skills and experience.

SOC Tier 3 Analyst at ECS | Renata