StaffAttract
  • Login
  • Create Account
  • Products
    • Private Ad Placement
    • Reports Management
    • Publisher Monetization
    • Search Jobs
  • About Us
  • Contact Us
  • Unsubscribe

Login

Forgot Password?

Create Account

Job title, industry, keywords, etc.
City, State or Postcode

Tier 3 SOC Analyst

IS3 Solutions - Charlotte, NC

Apply Now

Job Description

Job Title: Tier 3 SOC Analyst x2 Location: Charlotte, NC- 5 days a week Duration: 6 Month Contract to Hire Position Overview: Tier-3 Team Lead SOC Analyst sets and enforces operational standards, coordinates shift activities, delegates administrative and operational tasks, and serves as the primary local SOC contact in a multi-location SOC environment. The role he Lead Analyst drives continuous improvement across people, process, and technology to strengthen detection, response, and reporting outcomes. Key Responsibilities Ensure consistent incident handling across multiple SOC locations through standardize procedures and communication Lead daily operations such as threat briefings, queue health checks, and high-severity incident oversight Serve as final escalation for complex investigations (multi-stage intrusions, lateral movement, persistence, data exfiltration) Lead containment/eradication strategy in partnership with IT, Cloud, Endpoint, and Network teams Perform root-cause analysis and produce actionable remediation guidance Coach Tier 1/2 analysts on investigation techniques, log analysis, and response playbooks Integrate AI?driven detections and response Required Technical Skills 5+ years of relevant experience or equivalent combination of education and work experience Ability to lead and coordinate in a multi-location / follow-the-sun SOC model Strong mentoring and coaching skills Excellent written and verbal communication for technical and non-technical audiences Calm, structured decision-making during high-pressure incidents Strong case management discipline and evidence-based analysis Incident response experience handling high-severity events end-to-end (containment through recovery) Solid understanding of common attacker techniques: phishing, ransomware, C2, privilege escalation, lateral movement, exfiltration EDR/XDR proficiency: triage, remote response actions, artifact collection Familiar with AI-assisted attacks including deepfakes and social-engineering at scale

Created: 2026-04-02

➤
Footer Logo
Privacy Policy | Terms & Conditions | Contact Us | About Us
Designed, Developed and Maintained by: NextGen TechEdge Solutions Pvt. Ltd.