SOC Tier 2 Analyst

Portland, OR, US • Posted 5 hours ago • Updated 5 hours ago
Full Time
On-site
Fitment

Dice Job Match Score™

✨ Finding the perfect fit...

Job Details

Skills

  • Tier 2
  • Network
  • Recovery
  • Dashboard
  • Use Cases
  • Reporting
  • Leadership
  • Mentorship
  • Process Improvement
  • Continuous Improvement
  • Workflow
  • SIEM
  • Management
  • Log Analysis
  • Microsoft Windows
  • Linux
  • Computer Networking
  • Cloud Computing
  • Software Security
  • Analytical Skill
  • Documentation
  • Communication
  • Collaboration
  • System On A Chip
  • Security Operations
  • NIST SP 800 Series
  • IBM QRadar
  • Microsoft
  • Palo Alto
  • Security+
  • GCIH
  • GCIA
  • Certified Ethical Hacker
  • SSCP
  • Threat Analysis
  • Forensics
  • Splunk
  • Security Engineering
  • Incident Management
  • SAP BASIS
  • Law
  • Artificial Intelligence
  • Cyber Security
  • Partnership
  • Innovation
  • Accountability

Summary

Job Description

Everforth ECS is seeking a SOC Tier 2 Analyst to work in our Portland, OR office. Please Note: This position is contingent upon contract award.

The SOC Analyst 2 supports the organization's security operations by conducting deeper investigation of escalated alerts, correlating security telemetry, supporting incident response activities, and preparing incident summaries and recommendations. This role is the mid-level investigation and response-support tier within the SOC Analyst role family.

The ideal candidate has hands-on SOC or security operations experience, understands common attack techniques and defensive technologies, and can independently investigate security events while coordinating with SOC Analyst 1, SOC Analyst 3, threat intelligence, threat hunting, forensics, engineering, and business stakeholders.

Key Responsibilities

Escalated Alert Investigation & Correlation
  • Review and investigate alerts escalated by SOC Analyst 1 or automated SOC workflows to validate severity, scope, potential impact, and required response actions.
  • Analyze suspicious activity, indicators of compromise, anomalous behavior, and policy violations using logs, endpoint telemetry, network data, identity data, cloud events, and other evidence.
  • Correlate evidence across security platforms to identify affected assets, affected accounts, attack paths, timeline of activity, and potential business or mission impact.
  • Map observed behaviors to applicable frameworks and threat models such as MITRE ATT&CK when useful for investigation, reporting, or detection improvement.
Incident Response & Coordination Support
  • Support containment, eradication, and recovery activities for standard or moderate incidents in alignment with incident response plans and approved playbooks.
  • Coordinate with system owners, security engineers, senior analysts, and other technical teams to gather evidence, validate impact, and support response actions.
  • Escalate complex, high-impact, evidence-sensitive, or ambiguous incidents to SOC Analyst 3, SOC leadership, Forensics, Threat Hunter, Threat Intelligence Analyst, or other specialized roles as appropriate .
  • Maintain accurate incident status, action tracking, and communications during investigation and response activities.
Detection, Tuning & Process Improvement Input
  • Analyze recurring alerts, false positives, attack patterns, threat intelligence, vulnerabilities, and emerging tactics to identify opportunities to improve detection and response.
  • Recommend updates to correlation rules, alert logic, dashboards, use cases, response playbooks, and triage procedures based on investigation outcomes.
  • Operationalize threat intelligence in triage and investigation workflows by applying relevant indicators, adversary behaviors, vulnerabilities, and contextual reporting.
  • Provide operational requirements and validation feedback to SOC Analyst 3, SOC Threat Hunter, Senior Splunk Engineer, Splunk Architect/Lead, Security Engineer, and SOC Technical Writer as appropriate .
Reporting & Documentation
  • Document investigation activities, evidence, decisions, response actions, and outcomes clearly and accurately.
  • Prepare incident summaries, ticket updates, timelines, shift handoff notes, and supporting information for after-action documentation.
  • Communicate technical findings in clear operational, business, and risk language for SOC leadership and affected stakeholders.
  • Provide evidence summaries and analysis notes that can be used by Forensics or specialized teams when deeper analysis is required .
Mentorship & Continuous Improvement
  • Provide escalation guidance, quality feedback, and informal mentoring to SOC Analyst 1 personnel.
  • Participate in lessons-learned activities, tabletop exercises, detection reviews, and SOC process improvement efforts.
  • Stay current with evolving cyber threats, vulnerabilities, detection techniques, and security operations best practices.
  • Contribute to continuous improvement of SOC workflows, investigation checklists, documentation practices, and escalation procedures.


Required Skills

  • 3-5 years of experience in SOC operations, incident response, security monitoring, threat monitoring, or related technical cybersecurity roles.
  • Experience triaging escalated alerts and investigating security events using SIEM, EDR, ticketing, case management, and log analysis tools.
  • Intermediate knowledge of Windows, Linux, networking, cloud, identity, endpoint, and application security concepts.
  • Working knowledge of common attack techniques, incident response lifecycle activities, escalation procedures, playbooks, and evidence-handling practices.
  • Ability to correlate evidence across multiple tools, develop incident timelines, and determine recommended response actions.
  • Strong analytical, written documentation, communication, and collaboration skills, including the ability to guide SOC Analyst 1 personnel.


Desired Skills

  • Experience working in a 24x7 SOC, managed security operations environment, government program, or regulated organization.
  • Familiarity with frameworks and guidance such as MITRE ATT&CK, NIST CSF, NIST SP 800-61, CIS Controls, or Cyber Kill Chain.
  • Experience with tools such as Splunk, Microsoft Sentinel, QRadar , CrowdStrike, Microsoft Defender, Palo Alto, SOAR platforms, or similar technologies.
  • Certifications such as Security+, CySA +, GCIH, GCIA, CEH, SSCP, or equivalent experience.
  • Experience contributing to detection tuning recommendations, response playbook updates, tabletop exercises, or lessons-learned activities.
  • Experience coordinating with threat intelligence, threat hunting, forensics, Splunk engineering, security engineering, or incident response teams.

ECS Federal LLC is an equal opportunity employer and does not discriminate or allow discrimination on the basis any characteristic protected by law. All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, or local jurisdiction law.

Everforth ECS is the federal segment of Everforth , a $4B global organization with over 10,000 employees. Our nearly 3,500 professionals deliver advanced technology solutions in data and AI, cybersecurity, and enterprise transformation, serving defense, intelligence, and federal civilian agencies.

Our work powers mission-critical outcomes, strengthens technology partnerships, and creates meaningful opportunities for our people. We are defined by a commitment to excellence in delivery, a culture of innovation, and an environment where talent can thrive and grow.

We value:
  • Attracting and developing top talent and high-performing teams
  • Fostering a culture that is engaging, accountable, and mission-driven

Meet the challenge. Make a difference with Everforth ECS!
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: 10112MAN
  • Position Id: 3942
  • Posted 5 hours ago
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Portland, Oregon

Today

Full-time

Portland, Oregon

Today

Full-time

Portland, Oregon

Today

Full-time

Portland, Oregon

Today

Full-time

Search all similar jobs