SOC Analyst Tier 3

Gravity IT Resources

To Apply for this Job Click Here

Job Title: SOC Analyst Tier 3

Location: Miami, Florida – Dallas, Texas – Bentonville, Arkansas

Job-Type: Direct hire

Employment Eligibility: Gravity cannot transfer nor sponsor a work visa for this position. Applicants must be eligible to work in the U.S. for any employer directly (we are not open to contract or “corp to corp” agreements).

We are seeking a highly skilled and experienced security professional to join our Security Operations Center (SOC) team as a Tier 3 Analyst (Threat Hunter). In this role, you will be responsible for proactively hunting for advanced threats and vulnerabilities within our network environment. You will leverage your expertise in security tools and incident response to identify and investigate suspicious activity, ultimately strengthening our overall security posture.


  • Analyze network traffic, system logs, and other security data sources to identify potential indicators of compromise (IOCs) and advanced persistent threats (APTs).
  • Utilize threat intelligence feeds and advanced analytics techniques to identify emerging threats and vulnerabilities.
  • Document and escalate security incidents according to established procedures.
  • Collaborate with Tier 1 and Tier 2 analysts to provide guidance and support during incident response activities.
  • Recommend improvements to security tools and processes to enhance overall threat detection and prevention capabilities.
  • Stay up-to-date on the latest cyber threats and vulnerabilities through continuous learning and participation in security communities.



  • Minimum 3-5 years of experience in security operations, threat hunting, or a related field. Proven experience in incident response triage and investigation.
  • In-depth knowledge of security tools and technologies, including SIEM/SOAR platforms (e.g., Rapid7 InsightVM, Microsoft Sentinel, Cortex XDR), endpoint detection and response (EDR) solutions (e.g., Proofpoint TRAP), and ticketing systems (e.g., ServiceNow).
  • Strong understanding of network security concepts, operating systems, and malware analysis techniques.
  • Excellent analytical and problem-solving skills.
  • Ability to work independently and as part of a team in a fast-paced environment.
  • Excellent written and verbal communication skills.
  • Mandatory 3-days onsite; 2-days remote

Nice to haves:

  • Experience with security automation and scripting languages (e.g., Python or PowerShell).
  • Certifications in security (e.g., GCIH, OSCP, GCFA).
  • Experience in a cloud security environment (e.g., AWS, Azure, GCP).

We offer a competitive salary and benefits package, as well as the opportunity to work with a talented team in a dynamic and growing security organization.

To Apply for this Job Click Here