Demo

SOC Analyst & Incident Response Lead

CPA Associates International Inc
Myrtle, OR Full Time
POSTED ON 5/7/2026 CLOSED ON 5/13/2026

What are the responsibilities and job description for the SOC Analyst & Incident Response Lead position at CPA Associates International Inc?

About Avaya

Avaya is an enterprise software leader that helps the world’s largest organizations and government agencies forge unbreakable connections.

The Avaya Infinity™ platform unifies fragmented customer experiences, connecting the channels, insights, technologies, and workflows that together create enduring customer and employee relationships.

We believe success is built through strong connections – with each other, with our work, and with our mission. At Avaya, you'll find a community that values your contributions and supports your growth every step of the way.

Learn more at https://www.avaya.com

Job Information

Job Code: 00270114

Job Family: Information Technology

Job Function: Information Security

Job Description

We are seeking a highly skilled and experienced Tier 3 SOC Analyst who will also function as the Incident Response Lead. This is a hybrid technical-leadership position focused on managing critical security events, conducting forensic investigations, and continuously enhancing the incident response program. As a senior member of the SOC, you will be the escalation point for complex and high-impact security incidents, support forensic analysis, lead root cause investigations, and contribute to detection engineering efforts.

Key Responsibilities

Tier 3 SOC Analyst Duties

  • Act as the final escalation point for complex security alerts and incidents identified through Azure Sentinel and other security monitoring tools.
  • Conduct in-depth digital forensic investigations across endpoints, networks, and cloud infrastructure (Azure, M365, Microsoft Dynamics etc.).
  • Perform malware analysis, reverse engineering, and memory/disk analysis to support incident triage and response.
  • Provide expert-level guidance to Tier 1 and Tier 2 SOC analysts; coach and mentor to raise team capabilities.
  • Correlate threat intelligence with incident data to understand adversary behavior and campaign objectives.
  • Collaborate with SIEM engineers to tune, develop, and optimize detection use cases, particularly for emerging threats.
  • Maintain documentation of playbooks, threat scenarios, and incident patterns.
  • Assist in management of suite of security tools.

Incident Response Lead Duties

  • Lead and coordinate the end-to-end incident response lifecycle, from detection through containment, eradication, and recovery.
  • Own and maintain IR documentation including incident tracking, timelines, RCA, and after-action reports.
  • Liaise with the CSIRT team and relevant business stakeholders during critical incidents.
  • Lead post-incident reviews and facilitate lessons learned workshops, contributing to policy, procedure, and control improvements.
  • Drive continuous process improvement across SOC and IR operations, ensuring integration with change and problem management.
  • Ensure executive-level incident reporting and briefings are prepared and delivered as needed.

Qualifications

Required

  • 5 years of experience in a Security Operations Center or Incident Response role.
  • Proven experience leading major incident response efforts (e.g., ransomware, APT, data breaches).
  • Strong forensic analysis skills (disk, memory, log, and network forensics).
  • Advanced proficiency in SIEM platforms (preferably Microsoft Sentinel), EDR tools (Defender for Endpoint), and forensic toolsets.
  • Understanding of attacker TTPs mapped to MITRE ATT&CK and threat hunting methodologies.
  • Hands-on experience with scripting and automation (e.g., PowerShell, Python) to streamline investigations and response.
  • Knowledge of security controls, network protocols, operating systems, and cloud environments (Azure).
  • Strong communication skills and ability to present technical findings to non-technical stakeholders.
  • Must be available to work outside of working hours when necessary.

Desirable Certifications

  • GIAC Certified Forensic Analyst (GCFA) or GIAC Certified Incident Handler (GCIH)
  • CISSP, OSCP, GCIA, or equivalent
  • Microsoft certifications: SC-200, SC-300, AZ-500

Key Competencies

  • Calm and decisive under pressure
  • Analytical and detail-oriented
  • Strong leadership and collaboration skills
  • Proactive approach to process optimization and threat mitigation
  • Passion for continuous learning and capability development

The pay range for this opportunity is from $93,000 to $125,500 bonus potential benefits. This range represents the anticipated low and high end of the salary for this position. Actual salaries will vary and are based on factors such as a candidate’s qualifications, skills, competencies.

Experience

3 - 6 Years of Experience

Education

Bachelor degree or equivalent experience

Preferred Certifications

Footer

Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future.

Avaya is an Equal Opportunity employer and a U.S. Federal Contractor. Our commitment to equality is a core value of Avaya. All qualified applicants and employees receive equal treatment without consideration for race, religion, sex, age, sexual orientation, gender identity, national origin, disability, status as a protected veteran or any other protected characteristic. In general, positions at Avaya require the ability to communicate and use office technology effectively. Physical requirements may vary by assigned work location. This job brief/description is subject to change. Nothing in this job description restricts Avaya right to alter the duties and responsibilities of this position at any time for any reason.

Salary.com Estimation for SOC Analyst & Incident Response Lead in Myrtle, OR
$110,490 to $138,563
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

What is the career path for a SOC Analyst & Incident Response Lead?

Sign up to receive alerts about other jobs on the SOC Analyst & Incident Response Lead career path by checking the boxes next to the positions that interest you.
Income Estimation: 
$152,549 - $188,894
Income Estimation: 
$194,072 - $240,547
Income Estimation: 
$135,994 - $168,063
Income Estimation: 
$161,209 - $233,553
Income Estimation: 
$114,790 - $146,930
Income Estimation: 
$142,618 - $183,267
Income Estimation: 
$115,647 - $153,495
This job has expired.
Employees: Get a Salary Increase
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at CPA Associates International Inc

  • CPA Associates International Inc Myrtle, OR
  • About Avaya Avaya is an enterprise software leader that helps the world’s largest organizations and government agencies forge unbreakable connections. The ... more
  • 4 Days Ago

  • CPA Associates International Inc Chicago, IL
  • The Mission As a Renewals Specialist you are the technical bridge between "customer satisfaction" and "revenue growth." You aren't just processing renewals... more
  • 15 Days Ago


Not the job you're looking for? Here are some other SOC Analyst & Incident Response Lead jobs in the Myrtle, OR area that may be a better fit.

  • Cambia Health Solutions Medford, OR
  • Strategic Financial Analyst Lead Work a hybrid schedule within Oregon, Washington, Idaho or Utah Build a career with purpose. Join our Cause to create a pe... more
  • 16 Days Ago

  • ACA Group Medford, OR
  • The Opportunity: The Incident Manager ensures effective communication with management and stakeholders throughout the incident lifecycle, ensuring swift re... more
  • 17 Days Ago

AI Assistant is available now!

Feel free to start your new journey!