Remote SOC Mid-Level Analyst Job at ECS, Remote

cGhPbTczeWRRZGVNWnFiWWxPYWIySzVTbmc9PQ==
  • ECS
  • Remote

Job Description

ECS is seeking a  SOC Mid-Level Analyst  to work  remotely .

ECS is seeking a Mid-Level SOC Analyst with demonstrated experience supporting the development of processes, procedures, and automations to rapidly ingest, aggregate, correlate, normalize, and analyze event messages to rapidly and assuredly identify and respond to Indicators of Compromise (IoC). The ideal candidate is a critical thinker and perpetual learner who is excited to solve some of our clients’ toughest challenges. To be successful the candidate must have experience working in a mature 24x7x365 Security Operation Center.

Shift schedule:  Fri-Mon, 3:00PM – 1:00AM ET (subject to change)

Responsibilities include:

  • Continuously monitors SIEM and on-premises infrastructure/cloud applications for security events to threats & intrusions, including:
  • SIEM alert queue
  • Phishing email inbox
  • Intel feeds via email and other sources (i.e., US-CERT, MS-ISAC)
  • Incident ticketing queue
  • Participates with responding to and handling all critical incident activity. Ensure the execution of proper containment, remediation, and recovery activities.
  • Assesses and documents lessons learned as part of post-incident review, such as unsuccessful controls, outdated procedures, or incomplete remediation actions.
  • Coordinates with SIEM engineering to tune security events and alerts for improving alert fidelity. 
  • Assists with creating and tuning Security Orchestration and Automation (SOAR) playbooks and automated workflows. 
  • Performs proactive threat hunting to identify and characterize new emerging threats, vulnerabilities, and risks.
  • Works closely with Cyber Threat Intel to provide information on detection patterns for new upcoming threats
  • Compiles threat hunt reports as requested on any specific hunt/threat inquiry and disseminate to SOC leadership.

Conducts research and document events of interest within the scope of Cyber Security.

Salary Range: $120,000 – $145,000

Qualifications
  • Minimum of 3 years experience conducting analysis of log data in support of intrusion analysis or information security operations.
  • Bachelors degree or equivalent with relevant certifications.
  • Experience with two or more analysis tools used in a CIRT or similar investigative environment.
  • Ability to build content in SIEM system.
  • Ability to analyze and triage IoCs.

Jobicy JobID: 134595

Job Tags

Full time, Shift work,

Similar Jobs

Dollar General Fleet

CDL A Truck Driver Job at Dollar General Fleet

 ...Dollar General is currently hiring Class A CDL Truck Drivers for regional home weekly routes. We take care of our DG family so that you can take care of yours. As a driver for Dollar General's private fleet, you will be connecting our distribution centers with existing... 

Filmless

Freelance Voice Over Artist Job at Filmless

We have an ambitious mission at Filmless: provide the fastest, easiest, and most affordable way for companies to get professional videos. As a rapidly growing company, we're searching for individuals as determined as us who are ready to step up, take ownership, and...

Insta360

Video Producer Job at Insta360

Requirements:- Bachelor degree or above, major in directing, film photography, animation design, advertising and media related majors...  ...and lighting equipment, familiar with video software and video production and editing process; Experience with digital content such as... 

NYC Bar Association

Legal Intern (Summer 2026) | City Bar Justice Center Job at NYC Bar Association

 ...Legal Intern (Summer 2026) | City Bar Justice Center DURATION: The City Bar Justice Centers 2026 Summer Internship Program will run from approximately May 26, 2026 July 31, 2026. HOURS: Approximately 35 hours/week | Hybrid schedule COMPENSATION:...