Itlearn360
SOC Tier 3 Analyst at Stack studio digital Berkshire County, MA
Itlearn360, Oklahoma City, Oklahoma, United States
Overview
Job Title -
SOC Tier 3 Analyst SO C Tier 3 Analyst position at Stack Studio Digital in Berkshire County, MA. Hybrid work arrangement: 3 days in office. Role Description
We are seeking a highly experienced
SOC Tier 3 Analyst
to strengthen our Security Operations Center. As a Tier 3 CERT Analyst, the candidate will lead the investigation and remediation of advanced cyber threats using tools such as
Splunk, Microsoft Sentinel, CrowdStrike, Defender , and other security stacks. The role requires handling complex incidents including
Advanced Persistent Threats (APTs), malware, and data breaches , ensuring rapid and effective responses to reduce risks to the organization and its clients. The ideal candidate will have advanced expertise in monitoring, analyzing, and mitigating cybersecurity threats, mentoring junior analysts, and managing various security tools. This role also involves proactive
threat hunting, incident response , and cross-functional collaboration to continuously improve the organization\'s security posture. Key Responsibilities
Incident Detection and Response:
Lead investigations and remediation of complex incidents (e.g., malware, data breaches, APTs)
Use SIEM tools and threat intelligence platforms to analyze security alerts
Take ownership of Tier 3 escalations and guide Tier 1/2 analysts
Threat Hunting & Analysis:
Proactively hunt threats using behavioral analysis and intelligence data
Analyze logs, network traffic, and endpoint activity
Collaborate with security teams to identify hidden threats
Incident Forensics:
Perform forensic analysis to determine impact and root cause
Collect, preserve, and analyze breach evidence per legal/regulatory guidelines
Prepare incident findings and remediation reports
Remediation and Recovery:
Guide containment, eradication, and recovery activities
Collaborate with IT to restore compromised systems
Coordinate with threat intelligence teams on IOCs and countermeasures
Collaboration & Knowledge Sharing:
Work with internal teams (IT, DevOps, Security) to enhance security
Mentor Tier 1/2 teams and contribute to upskilling
Participate in post-incident reviews and process improvements
Security Intelligence & Research:
Stay updated on emerging threats and vulnerabilities
Contribute to threat intelligence by sharing research findings
Create and maintain custom detection playbooks/signatures
Reporting & Documentation:
Create detailed technical incident reports
Present findings to leadership, clients, or regulators
Document workflows, timelines, and actions for improvement
Compliance and Risk Management:
Align response activities with standards (e.g., NIST, ISO 27001, GDPR)
Coordinate with legal and compliance teams regarding data privacy laws
Key Skills / Knowledge / Experience
Education: Bachelor\'s degree in Computer Science, IT, Systems Engineering, or related field
Experience: 6-8 years in cybersecurity, with focus on
incident response, forensics, and threat hunting
Experience with APTs, ransomware, and data breach investigations
Hands-on with SIEM tools (e.g., Splunk, ArcSight) and EDR solutions
Technical Skills: Proficient in
incident response, network/system forensics, malware/memory analysis
Threat analysis on Windows, Linux, and cloud platforms
Scripting experience (e.g., Python, PowerShell)
Certifications (Preferred): CISSP
GCIH or EC-Council Certified Incident Handler
CFCE
GCFA
GCIA
Analytical Skills: Strong analytical mindset; ability to connect complex threat data
Skilled in troubleshooting and decision-making under pressure
Soft Skills: Excellent communication and collaboration skills
Capable of explaining technical issues to non-technical stakeholders
Resilient in high-pressure and escalated scenarios
Work Environment: Fast-paced SOC environment
Availability for
after-hours or weekend work
during incidents
On-call rotation
may be required
Person Specification Strong communication and client-facing skills
Assertive yet collaborative approach
Team leadership and mentoring experience
Supportive team member with a problem-solving mindset
#J-18808-Ljbffr
Job Title -
SOC Tier 3 Analyst SO C Tier 3 Analyst position at Stack Studio Digital in Berkshire County, MA. Hybrid work arrangement: 3 days in office. Role Description
We are seeking a highly experienced
SOC Tier 3 Analyst
to strengthen our Security Operations Center. As a Tier 3 CERT Analyst, the candidate will lead the investigation and remediation of advanced cyber threats using tools such as
Splunk, Microsoft Sentinel, CrowdStrike, Defender , and other security stacks. The role requires handling complex incidents including
Advanced Persistent Threats (APTs), malware, and data breaches , ensuring rapid and effective responses to reduce risks to the organization and its clients. The ideal candidate will have advanced expertise in monitoring, analyzing, and mitigating cybersecurity threats, mentoring junior analysts, and managing various security tools. This role also involves proactive
threat hunting, incident response , and cross-functional collaboration to continuously improve the organization\'s security posture. Key Responsibilities
Incident Detection and Response:
Lead investigations and remediation of complex incidents (e.g., malware, data breaches, APTs)
Use SIEM tools and threat intelligence platforms to analyze security alerts
Take ownership of Tier 3 escalations and guide Tier 1/2 analysts
Threat Hunting & Analysis:
Proactively hunt threats using behavioral analysis and intelligence data
Analyze logs, network traffic, and endpoint activity
Collaborate with security teams to identify hidden threats
Incident Forensics:
Perform forensic analysis to determine impact and root cause
Collect, preserve, and analyze breach evidence per legal/regulatory guidelines
Prepare incident findings and remediation reports
Remediation and Recovery:
Guide containment, eradication, and recovery activities
Collaborate with IT to restore compromised systems
Coordinate with threat intelligence teams on IOCs and countermeasures
Collaboration & Knowledge Sharing:
Work with internal teams (IT, DevOps, Security) to enhance security
Mentor Tier 1/2 teams and contribute to upskilling
Participate in post-incident reviews and process improvements
Security Intelligence & Research:
Stay updated on emerging threats and vulnerabilities
Contribute to threat intelligence by sharing research findings
Create and maintain custom detection playbooks/signatures
Reporting & Documentation:
Create detailed technical incident reports
Present findings to leadership, clients, or regulators
Document workflows, timelines, and actions for improvement
Compliance and Risk Management:
Align response activities with standards (e.g., NIST, ISO 27001, GDPR)
Coordinate with legal and compliance teams regarding data privacy laws
Key Skills / Knowledge / Experience
Education: Bachelor\'s degree in Computer Science, IT, Systems Engineering, or related field
Experience: 6-8 years in cybersecurity, with focus on
incident response, forensics, and threat hunting
Experience with APTs, ransomware, and data breach investigations
Hands-on with SIEM tools (e.g., Splunk, ArcSight) and EDR solutions
Technical Skills: Proficient in
incident response, network/system forensics, malware/memory analysis
Threat analysis on Windows, Linux, and cloud platforms
Scripting experience (e.g., Python, PowerShell)
Certifications (Preferred): CISSP
GCIH or EC-Council Certified Incident Handler
CFCE
GCFA
GCIA
Analytical Skills: Strong analytical mindset; ability to connect complex threat data
Skilled in troubleshooting and decision-making under pressure
Soft Skills: Excellent communication and collaboration skills
Capable of explaining technical issues to non-technical stakeholders
Resilient in high-pressure and escalated scenarios
Work Environment: Fast-paced SOC environment
Availability for
after-hours or weekend work
during incidents
On-call rotation
may be required
Person Specification Strong communication and client-facing skills
Assertive yet collaborative approach
Team leadership and mentoring experience
Supportive team member with a problem-solving mindset
#J-18808-Ljbffr