Want to get hired at ECS Tech Inc?
SOC Mid-Level Analyst
ECS Tech Inc
HybridHybrid
Original Job Summary
SOC Mid-Level Analyst
ECS Tech Inc is seeking a remote SOC Mid-Level Analyst with experience in developing processes, procedures, and automations to ingest, aggregate, correlate, normalize, and analyze event messages for rapid threat detection and response.
Responsibilities
- Continuously monitor SIEM, phishing inbox, intel feeds, and incident tickets.
- Respond to critical incidents ensuring proper containment, remediation, and recovery.
- Document post-incident lessons learned and update procedures accordingly.
- Coordinate with SIEM engineering to tune alerts for improved fidelity.
- Create and tune SOAR playbooks and automated workflows.
- Perform proactive threat hunting and compile threat reports.
- Collaborate with Cyber Threat Intel for emerging threat detection.
- Conduct research and document notable security events.
Qualifications & Benefits
- Minimum three years of experience in log data analysis and intrusion analysis.
- Bachelor’s degree or equivalent with relevant certifications.
- Experience with multiple analysis tools in a CIRT environment.
- Ability to build SIEM content and analyze IoCs.
- Working in a mature 24x7x365 Security Operations Center.
Shift Schedule & Salary
Shift: Sun-Thu, 11:00PM - 7:00AM ET (subject to change).Salary Range: $120,000 - $140,000.
Key Skills/Competency
- SOC
- SIEM
- Threat Hunting
- Incident Response
- Automation
- Cyber Security
- Log Analysis
- SOAR
- IoC Analysis
- Threat Intel
How to Get Hired at ECS Tech Inc
🎯 Tips for Getting Hired
- Customize your resume: Match your skills to SOC analysis.
- Highlight SIEM experience: Detail your tool proficiency clearly.
- Emphasize incident response: Showcase your crisis management skills.
- Prepare for technical interviews: Focus on threat hunting and automation.
📝 Interview Preparation Advice
Technical Preparation
circle
Review SIEM configuration basics.
circle
Practice analyzing log files.
circle
Study incident response protocols.
circle
Explore SOAR playbook development.
Behavioral Questions
circle
Describe past crisis management experiences.
circle
Explain handling of critical security incidents.
circle
Discuss teamwork in high-pressure environments.
circle
Showcase continuous learning in cyber security.