Enable job alerts via email!

Senior SOC Analyst/Lead @ ECS

Cyber Crime

Mississippi

Remote

USD 90,000 - 130,000

Full time

3 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

A leading company in technology seeks a Senior SOC Analyst/Lead to work remotely. The role focuses on cybersecurity operations, including threat monitoring, incident response, and leading a team of analysts. The ideal candidate will have extensive experience in a SOC environment and proven leadership skills, with a passion for solving complex challenges.

Qualifications

  • 7+ years of experience in cybersecurity operations & incident response, at least 3+ years in a SOC environment.
  • 2+ years in a leadership role.
  • Ability to interpret complex cybersecurity topics.

Responsibilities

  • Monitor and manage threats, respond to incident escalations from the SOC.
  • Lead root cause analysis and define process improvements.
  • Provide training and mentorship to SOC analysts.

Skills

Cybersecurity
Incident Response
Digital Forensic Analysis
SIEM Technologies
Threat Intelligence
Malware Analysis
Vulnerability Management
Leadership
Communication
Problem-Solving

Education

Industry-recognized certifications (CISSP, CISM, GIAC, CEH preferred)

Tools

QRadar
Splunk
CrowdStrike
Tenable

Job description

ECS
ECS is a technology leader in science, engineering, cloud, cybersecurity, artificial intelligence, machine learning and IT modernization. Reach out today.

View all jobs at ECS

ECS is seeking aSenior SOC Analyst/Leadto workremotely.

ECS is seeking a Senior SOC Analyst (SOC Lead) with demonstrated experience supporting the development of processes, procedures, and automations to rapidly ingest, aggregate, correlate, normalize, analyze event messages to absurdly identify and respond to Indicators of Compromise (IoCs). The ideal candidate is a critical thinker and perpetual learner who is excited to solve some of our clients’ toughest challenges. To be successful the candidate must have experience working in a mature 24x7x365 Security Operation Center.

Shift schedule: Monday-Thursday, 10PM-8AM ET(subject to change)

  • Provides subject matter expertise for monitoring and managing threats, disseminating information, and handling, responding to, and investigating all incident escalations from the Security Operations Center.
  • Ensures all security incidents are tracked and documented appropriately.
  • Continuously monitors SIEM and on-premises infrastructure/cloud applications for security events to threats & intrusions, including:
  • Phishing email inbox
  • Intel feeds via email and other sources (i.e., US-CERT, MS-ISAC)
  • Ensures the SOC manager stays informed of any issues or incidents.
  • Coordinates with SOC staff to conduct incident/policy violation investigations, report infractions, eradicate/mitigate/remediate Indications of Compromise (IoC), and perform continuous monitoring functions.
  • Leads root cause analysis and post-mortem dialogue after significant events to capture lessons learned and define process or technology improvements.
  • Owns the successful completion of all daily operational processes and procedures.
  • Develops and maintains standard operating procedures (SOPs), technical playbooks and operational run books to support SOC operations and incident response activities.
  • Conduct follow-up meetings of escalated or noteworthy cases and modifies SOPs and playbooks based on policies, standards and best practices learned from previous cases.
  • Works in conjunction with SOC and infrastructure management teams to administer and manage the SOC security technologies.
  • Evaluates Common Vulnerabilities and Exposures (CVE) as a potential internal/external attach vector, develop recommendations to eliminate vulnerability/weakness if present.
  • Work closely with Cyber Threat Intel to provide information on detection patterns for new upcoming threats.
  • Oversees threat hunting initiatives and reviews hunt reports that are provided by SOC analysts.
    Provides training and mentorship to SOC analyst to improve the incident handling capabilities.
  • Provides guidance for all internal stakeholders for reporting and visualizations that supports SOC goals and objectives to identify and correct gaps.
  • Reconfigures analytic objects (e.g., fields, extractions, tags, event types, lookups, workflow actions, aliases).
  • Develops reports for operational activities to meet SOC and cybersecurity leadership requirements and directives.
  • Provides extensive knowledge of cybersecurity, incident response, digital forensic analysis and educate personnel on effective SOC searches, reporting, and visualization development.
  • 7+ years of experience in cybersecurity operations & incident response, with at least 3+ years in a SOC environment and 2+ years in a leadership role
  • Ability to interpret complex cybersecurity topics and effectively communicate or present information to various groups of stakeholders (Executives, SOC, etc.)
  • In-depth knowledge of SIEM technologies (i.e. QRadar, Splunk), EDR (i.e. CrowdStrike), IDS/IPS, malware analysis, and vulnerability management tools (i.e.Tenable).
  • Experiencing leading and mentoring junior analysts
  • Experience with two or more analysis tools used in a CIRT or similar investigative environment.
  • Ability to analyze and triage IoCs.
  • Proven understanding of computer and network fundamentals
  • Ability to perform in-depth research tasks and produce written summaries to include insights and predictions based on an analytical process.
  • Knowledge of current cyber threats, trends, attack lifecycle, and various Tactics, Techniques, and Procedures (TTPs)
  • Industry-recognized certifications, such as CISSP, CISM, GIAC, or CEH, are preferred
  • Excellent leadership, written and oral communication skills, and problem-solving skills
  • Ability to handle high-stress situations with a calm and methodical approach

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

909#Senior Statistical Programmer Consultant -Oncology (remote) New

ClinChoice Inc.

Mississippi

Remote

USD 90,000 - 120,000

5 days ago
Be an early applicant

Clinical Applications Specialist

Gehealthcare

Kansas City

Remote

USD 115,000 - 173,000

Yesterday
Be an early applicant

Regulatory Consultant

Syneos Health, Inc.

Mississippi

Remote

USD 80,000 - 110,000

Yesterday
Be an early applicant

Lead Marketing Analyst New Distributed, -- + -- (US + Canada)

Hatch, Inc.

California

Remote

USD 120,000 - 200,000

2 days ago
Be an early applicant

Feed Sales Account Specialist

Vermont Creamery, L.L.C.

Bentonville

Remote

USD 87,000 - 107,000

2 days ago
Be an early applicant

Microsoft 365 Consultant

Infodash, LLC

Mississippi

Remote

USD 115,000 - 135,000

2 days ago
Be an early applicant

Solutions Design Specialist - Laboratory

Abbott

Philadelphia

Remote

USD 85,000 - 171,000

2 days ago
Be an early applicant

Expert Software Engineer (Front End) - Remote

Allscripts

Philadelphia

Remote

USD 100,000 - 130,000

3 days ago
Be an early applicant

Allergy Territory Account Specialist – Kansas City, MO

Novartis

Kansas City

Remote

USD 93,000 - 175,000

4 days ago
Be an early applicant