Tier 3 SOC Analyst

Job ID: 112446
Location: Rockville, MD  [On-Site]
Category: App/Dev
Employment Type: Contract
Date Added: 05/05/2026

Apply Now

Fill out the form below to submit your information for this opportunity. Please upload your resume as a doc, pdf, rtf or txt file. Your information will be processed as soon as possible.


 
 
 
 
 
(Word, PDF, RTF, TXT)
* Required field.

Role Summary
The Tier 3 Security Operations Center (SOC) Analyst is a senior-level cybersecurity professional responsible for monitoring, analyzing, and responding to complex security events across multiple data sources. This role includes providing leadership and mentorship to Tier 1 and Tier 2 analysts, overseeing shift operations, and ensuring the timely detection and mitigation of security incidents. The position requires strong technical expertise, excellent communication skills, and the ability to coordinate security efforts within a fast-paced environment.

Responsibilities

  • Analyze security alerts and respond to incidents from SIEM, firewall, IDS, IPS, antivirus, and network access control systems.
  • Lead shift activities, supervising Tier 1 and Tier 2 analysts to ensure effective incident response.
  • Provide mentorship and technical guidance to junior team members, fostering professional development.
  • Communicate complex security technical details clearly to clients and team members in written and verbal formats.
  • Coordinate and manage security investigations involving log analysis, packet captures, and protocol analysis.
  • Collaborate with team members to improve SOC processes, workflows, and incident handling procedures.
  • Maintain current knowledge of security threats, vulnerabilities, and best practices in cybersecurity defense.
  • Support the integration and management of security tools such as Splunk, CrowdStrike, and other SIEM platforms.
  • Maintain operational readiness and ensure compliance with security policies and standards.
  • Assist in the development of security monitoring metrics and reporting to stakeholders.

Qualifications

  • 3-5 years of experience in a Security Operations Center or cybersecurity environment, including demonstrated team leadership.
  • Proficiency with Windows, Linux, or UNIX operating systems.
  • Strong analytical skills and experience with security event analysis and incident response.
  • Excellent written and verbal communication skills, capable of conveying technical information clearly.
  • Hands-on experience with SIEM tools such as Splunk or similar platforms, and endpoint detection tools like CrowdStrike.
  • This position requires eligibility for a U.S. Government security clearance. In accordance with federal law, U.S. citizenship is required.
  • Ability to work on-site in a fast-paced, shift-based environment (target shift: 12 pm – 10 pm).
  • Familiarity with common network protocols and services (FTP, HTTP, SSH, SMB, DAP).
  • Relevant certifications such as CSIS, CEH, CSTA, CSTP, GCFE, CISSP, GCIH, GCIA, GPEN are preferred.
  • Knowledge of IDS log analysis, packet capture tools, and military or government support experience is a plus.

Publishing Pay Range: $60.00 – $65.00 hourly

This position is based in office and requires employee to work on-site.