SOC Chief

Posted 6 Hours Ago
Be an Early Applicant
Portland, OR, USA
In-Office
Expert/Leader
Artificial Intelligence • Cloud • Information Technology • Security • Software
The Role
Responsible for leading Security Operations Center strategy, overseeing daily operations, incident response, and ensuring alignment with mission objectives and compliance.
Summary Generated by Built In
Job Summary & Responsibilities

Everforth ECS is seeking a SOC Chief to work in our Portland, OR office.  Please Note: This position is contingent upon contract award.

 

The SOC Chief is responsible for leading Security Operations Center (SOC) strategy, operations, personnel, processes, and mission execution. This role oversees daily and long-term SOC activities, including monitoring, triage, incident escalation, threat detection, reporting, quality assurance, and continuous improvement across the cyber operations environment. 

The ideal candidate combines deep security operations expertise, strong leadership ability, incident response experience, and the capacity to communicate operational risk clearly to technical teams, program leadership, and senior stakeholders. This role ensures the SOC operates effectively, aligns with mission priorities, and delivers timelyaccurate, and actionable security outcomes. 

 

Key Responsibilities 

SOC Leadership & Operational Oversight 

  • Lead day-to-day SOC operations, ensuring monitoring, triage, analysis, escalation, and reporting activities are performed accurately, consistently, and within established timelines. 
  • Establish operational priorities, shift expectations, escalation paths, handoff procedures, and service-level expectations for SOC analysts and supporting teams. 
  • Ensure SOC activities align with program objectives, mission needs, regulatory requirements, operational risk priorities, and cybersecurity best practices. 
  • Oversee coordination among SOC Tier 1, Tier 2, Tier 3, threat hunting, threat intelligence, forensics, engineering, and program management personnel. 

Incident Response & Escalation Management 

  • Provide leadership during significant cybersecurity events, ensuring incidents are triaged, escalated, investigated, documented, and communicated appropriately. 
  • Coordinate incident response activities across analysts, engineers, forensic personnel, system owners, leadership, and external stakeholders as required. 
  • Review and validate major incident findings, severity determinations, escalation decisions, containment recommendations, and operational impacts. 
  • Ensure lessons learned, after-action reviews, and corrective actions are captured and used to improve SOC procedures and response effectiveness. 

Detection, Monitoring & Threat Operations 

  • Oversee the effectiveness of SOC monitoring, alert triage, detection use cases, dashboards, reports, correlation rules, and security analytics capabilities. 
  • Partner with threat hunters, threat intelligence analysts, Splunk engineers, security engineers, and detection teams to identify coverage gaps and improve alert fidelity. 
  • Support prioritization of new detection logic, data source onboarding, tuning efforts, threat-informed monitoring, and operational use-case development. 
  • Ensure SOC workflows support timely identification, analysis, investigation, and disposition of suspicious or malicious activity. 

Process, Quality Assurance & Governance 

  • Develop, maintain, and enforce SOC standard operating procedures, playbooks, runbooks, escalation guides, reporting standards, and quality-control processes. 
  • Monitor case quality, analyst documentation, ticket handling, alert disposition accuracy, and adherence to approved procedures. 
  • Define and track SOC performance metrics, operational trends, workload indicators, service levels, incident statistics, and continuous-improvement actions. 
  • Support audit readiness, compliance reporting, risk management, and governance activities related to SOC operations and cyber incident response. 

Team Leadership & Workforce Development 

  • Lead, mentor, and coordinate SOC analysts and operational contributors, supporting consistent performance, professional development, and mission readiness. 
  • Assign responsibilities, review work products, provide operational guidance, and ensure appropriate coverage for shifts, surge activities, and priority events. 
  • Identify training needs and coordinate with cyber training personnel to improve analyst skills, tool proficiency, process knowledge, and incident response discipline. 
  • Promote a culture of accountability, collaboration, technical rigor, documentation quality, and continuous learning across SOC personnel. 

Stakeholder Engagement & Reporting 

  • Serve as the primary operational point of contact for SOC status, incident escalation, operational risks, performance metrics, and mission-impacting issues. 
  • Brief program leadership, customer stakeholders, technical teams, and senior decision-makers on SOC activities, incidents, trends, risks, and recommended actions. 
  • Translate technical findings and operational activity into clear business, mission, and risk language for non-technical stakeholders. 
  • Coordinate communications with system owners, engineering teams, assessment teams, training teams, and program management to support mission outcomes. 

Technology, Tooling & Capability Management 

  • Provide operational input into SOC tooling requirements, including SIEM, SOAR, EDR, NDR, case management, threat intelligence, vulnerability, reporting, and collaboration platforms. 
  • Partner with Splunk, security engineering, architecture, and infrastructure teams to ensure tools support monitoring, investigation, reporting, retention, and escalation needs. 
  • Identify tool, data, workflow, and integration gaps that affect SOC effectiveness and recommend improvements or prioritization actions. 
  • Support acceptance, testing, operational readiness, and transition of new SOC capabilities into production use. 

Continuous Improvement & Program Support 

  • Drive continuous improvement of SOC operating models, procedures, metrics, playbooks, escalation processes, staffing approaches, and mission support capabilities. 
  • Analyze recurring issues, incident trends, false positives, workflow bottlenecks, and reporting gaps to improve SOC efficiency and effectiveness. 
  • Support planning, staffing estimates, schedule coordination, roadmap development, and program reporting for SOC-related initiatives. 
  • Stay current with evolving cyber threats, SOC operating practices, detection methodologies, incident response approaches, and security operations technologies. 
Preferred Qualifications
  • 8+ years of experience in cybersecurity, security operations, incident response, threat detection, cyber defense, or related technical roles. 
  • 3+ years of experience leading SOC operations, incident response teams, cyber operations teams, or similar security functions. 
  • Strong understanding of SOC workflows, alert triage, escalation management, incident response, threat hunting, threat intelligence, detection engineering, and security monitoring. 
  • Experience overseeing or supporting security tools such as SIEM, SOAR, EDR, NDR, IDS/IPS, firewalls, vulnerability management tools, ticketing platforms, and case management systems. 
  • Demonstrated ability to lead technical teams, coordinate cross-functional response activities, manage priorities, and ensure timely delivery of operational outcomes. 
  • Experience developing or enforcing SOPs, playbooks, runbooks, escalation guides, metrics, reports, and quality-control processes. 
  • Ability to analyze operational risk, validate incident information, communicate impacts, and brief technical and non-technical stakeholders. 
  • Excellent written and verbal communication skills, including experience producing operational reports, executive briefings, and incident updates. 

Skills Required

  • 8+ years of experience in cybersecurity, security operations, incident response, threat detection, or related roles
  • 3+ years of experience leading SOC operations or incident response teams
  • Strong understanding of SOC workflows and incident response
  • Experience with security tools such as SIEM, SOAR, EDR, NDR
  • Ability to analyze operational risk and communicate impacts

ECS Compensation & Benefits Highlights

The following summarizes recurring compensation and benefits themes identified from responses generated by popular LLMs to common candidate questions about ECS and has not been reviewed or approved by ECS.

  • Healthcare Strength ECS advertises multiple national-network medical plan options with HSA eligibility alongside dental and vision coverage. Coverage generally begins quickly and is paired with company-paid short- and long-term disability, adding stability to the health package.
  • Retirement Support A 401(k) with Safe Harbor and immediate vesting on employer contributions is emphasized, with an employer match available. Access to an employee stock purchase plan via the parent company provides an additional savings avenue.
  • Parental & Family Support Paid parental leave up to 30 days, adoption assistance, and other family-oriented leaves are highlighted. Feedback suggests these offerings add meaningful value beyond base pay for many roles.

ECS Insights

Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Fairfax, VA
2,129 Employees
Year Founded: 1993

What We Do

ECS, a segment of ASGN (NYSE: ASGN), delivers advanced solutions and services in cloud, cybersecurity, artificial intelligence (AI), machine learning (ML), application and IT modernization, and science and engineering. The company solves critical, complex challenges for customers across the U.S. public sector, defense, intelligence and commercial industries. ECS maintains partnerships with leading cloud, cybersecurity, and AI/ML providers and holds specialized certifications in their technologies. Headquartered in Fairfax, Virginia, ECS has more than 3,400 employees throughout the U.S. and has been recognized as a Top Workplace by The Washington Post for the last five years.

Similar Jobs

MetLife Logo MetLife

Billing Analyst

Fintech • Information Technology • Insurance • Financial Services • Big Data Analytics
Remote or Hybrid
United States
43000 Employees
50K-65K Annually

Applied Systems Logo Applied Systems

Solution Specialist

Cloud • Insurance • Payments • Software • Business Intelligence • App development • Big Data Analytics
Remote or Hybrid
United States
3040 Employees
62K-100K Annually

Wells Fargo Logo Wells Fargo

Associate Corporate Security Guard

Fintech • Financial Services
Hybrid
Portland, OR, USA
205000 Employees

Cox Enterprises Logo Cox Enterprises

Customer Care Specialist (Cox Automotive Fleet Client Solutions Delivery)

Artificial Intelligence • Automotive • Greentech • Information Technology • Machine Learning • Software • Cybersecurity
Remote or Hybrid
United States
50000 Employees
18-27 Hourly

Similar Companies Hiring

Golden Pet Brands Thumbnail
Digital Media • eCommerce • Information Technology • Marketing Tech • Pet • Retail • Social Media
El Segundo, California
178 Employees
Kepler  Thumbnail
Fintech • Software
New York, New York
6 Employees
Onshore Thumbnail
Artificial Intelligence • Fintech • Software • Financial Services
New York, New York
60 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account