BlueVoyant
Overview
SOC Security Analyst L3
Location: Hybrid in College Park, Maryland (1-2 days per week in office)
Shift Requirement: BlueVoyant's U.S. Commercial SOC operates on a four days on, three days off schedule. The shift for this role is: Wednesdays-Saturdays, with 8am - 6pm or 10am - 8pm options.
US Citizenship Required
Summary BlueVoyant is looking for Security Operations Center (SOC) Analysts to defend our global customers from the constant fight against adversaries. You will be part of a fast-paced team that helps spot, defend, and remediate adversary activity to reduce the impact and dwell time of security incidents.
Responsibilities
Monitor and analyze security events and alerts from multiple sources, including SIEM logs, endpoint logs, and EDR telemetry
Research indicators and activities to determine reputation and suspicious attributes
Perform analysis of malware, attacker network infrastructure, and forensic artifacts
Execute complex investigations and handle incident declaration
Perform live response analysis of compromised endpoints
Hunt for suspicious activity based on anomalous activity and curated intelligence
Participate in the response, investigation, and resolution of security incidents
Provide incident investigation, handling, response, and incident documentation
Engage and assist the BlueVoyant Incident Response teams for active intrusions
Ensure events are properly identified, analyzed, and escalated to incidents
Assist in the advancement of security policies, procedures, and automation
Serve as the technical escalation point and mentor for lower-level analysts
Regularly communicate with clients to inform them of incidents and aid in remediation
Identification and tuning of false-positive or benign detections
Perform peer review and QA of junior analyst investigations
Support Customer Success team with client engagements when required
Basic Qualifications
People Skills:
Ability to handle high pressure situations in a productive and professional manner
Ability to work directly with customers to understand requirements for and feedback on security services
Advanced written and verbal communication skills and the ability to present complex technical topics in clear and easy-to-understand language
Strong teamwork and interpersonal skills, including the ability to work effectively with a globally distributed team
Able and willing to work in a 24/7/365 environment, including nights and weekends, on a rotating shift schedule
Tech Skills
Knowledge and experience with SIEM solutions, Cloud App Security tools, and EDR
Advanced knowledge and understanding of network protocols and network telemetry
Forensic artifact and analysis knowledge of Windows and Unix systems
Expertise in Endpoint, Web, and Authentication log analysis
Experience with SIEM/EDR detection creation
Experience in responding to modern authentication attacks against AD, Entra, OATH, etc.
Expert knowledge of common attack paths, including LOLbin use, common adversary tools, business email compromises, AiTM attacks, including identification and response
Knowledge areas:
SIEM workflows (preferably Sentinel and Splunk)
Modern authentication systems and attacks (SSO, OATH, Entra, etc.)
Malware Detection, to include dynamic and light static analysis
Network Monitoring metadata (web logs, firewall logs, WAF/IDS)
Email Security and common business email compromise attacks
Windows and Unix forensic artifacts (i.e. registry analysis, wtmp/btmp)
Windows PE and Maldoc analysis
Remote access solutions (both legitimate and inherently malicious)
Lateral movement methodologies and tools for Windows & Unix-based OSes
O365 attack paths, common attacker methodologies, and analysis
Network metadata analysis and knowledge of commonly abused protocols
Credential harvesting tools and methodologies
Experience countering ransomware threat actors / operations preferred
Preferred Qualifications
Experience intrusion analysis / incident response, digital forensics, penetration testing, or related areas
5+ years of hands-on SOC/TOC/NOC experience
GIAC certification(s) strongly preferred. CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred
Familiarity with technologies such as Sentinel, Splunk, Microsoft Defender suites, Crowdstrike Falcon, SentinelOne
Familiarity with GPO, Landesk, or other IT Infrastructure tools
Understanding and/or experience with one or more programming languages: JavaScript, Python, Lua, Ruby, GoLang, Rust
Education
Minimum bachelor’s degree in information security, Computer Science, or other IT-related field or equivalent experience
About BlueVoyant At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics and technology, coupled with deep expertise, works as a force multiplier to secure your full ecosystem. Accuracy! Actionability! Timeliness! Scalability!
Led by CEO, Jim Rosenthal, BlueVoyant’s highly skilled team includes former government cyber officials with extensive frontline experience in responding to advanced cyber threats on behalf of the NSA, FBI, Unit 8200 and GCHQ, together with private sector experts. BlueVoyant services utilize large real-time datasets with industry leading analytics and technologies.
Founded in 2017 by Fortune 500 executives, including Executive Chairman, Tom Glocer, and former Government cyber officials, BlueVoyant is headquartered in New York City and has offices in Maryland, Tulsa, San Francisco, Leeds, London, Cork, Budapest, Tel Aviv and Latin America.
Legal Notice All employees must be authorized to work in the United States. BlueVoyant provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, BlueVoyant complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.
Disclaimer:
Please note that pursuant to contractual requirements and applicable law, in order for employees to perform work on some of the company’s federal contracts, U.S. citizenship is required. Accordingly, an employee’s ability to perform work on such contracts is contingent upon the company’s verification of the employee’s citizenship status.
BlueVoyant Candidate Privacy Notice
To understand how we secure and manage your personal data upon submitting a job application, please see our Candidate Privacy Notice, which can be found here - Candidate Privacy Notice
#J-18808-Ljbffr
Location: Hybrid in College Park, Maryland (1-2 days per week in office)
Shift Requirement: BlueVoyant's U.S. Commercial SOC operates on a four days on, three days off schedule. The shift for this role is: Wednesdays-Saturdays, with 8am - 6pm or 10am - 8pm options.
US Citizenship Required
Summary BlueVoyant is looking for Security Operations Center (SOC) Analysts to defend our global customers from the constant fight against adversaries. You will be part of a fast-paced team that helps spot, defend, and remediate adversary activity to reduce the impact and dwell time of security incidents.
Responsibilities
Monitor and analyze security events and alerts from multiple sources, including SIEM logs, endpoint logs, and EDR telemetry
Research indicators and activities to determine reputation and suspicious attributes
Perform analysis of malware, attacker network infrastructure, and forensic artifacts
Execute complex investigations and handle incident declaration
Perform live response analysis of compromised endpoints
Hunt for suspicious activity based on anomalous activity and curated intelligence
Participate in the response, investigation, and resolution of security incidents
Provide incident investigation, handling, response, and incident documentation
Engage and assist the BlueVoyant Incident Response teams for active intrusions
Ensure events are properly identified, analyzed, and escalated to incidents
Assist in the advancement of security policies, procedures, and automation
Serve as the technical escalation point and mentor for lower-level analysts
Regularly communicate with clients to inform them of incidents and aid in remediation
Identification and tuning of false-positive or benign detections
Perform peer review and QA of junior analyst investigations
Support Customer Success team with client engagements when required
Basic Qualifications
People Skills:
Ability to handle high pressure situations in a productive and professional manner
Ability to work directly with customers to understand requirements for and feedback on security services
Advanced written and verbal communication skills and the ability to present complex technical topics in clear and easy-to-understand language
Strong teamwork and interpersonal skills, including the ability to work effectively with a globally distributed team
Able and willing to work in a 24/7/365 environment, including nights and weekends, on a rotating shift schedule
Tech Skills
Knowledge and experience with SIEM solutions, Cloud App Security tools, and EDR
Advanced knowledge and understanding of network protocols and network telemetry
Forensic artifact and analysis knowledge of Windows and Unix systems
Expertise in Endpoint, Web, and Authentication log analysis
Experience with SIEM/EDR detection creation
Experience in responding to modern authentication attacks against AD, Entra, OATH, etc.
Expert knowledge of common attack paths, including LOLbin use, common adversary tools, business email compromises, AiTM attacks, including identification and response
Knowledge areas:
SIEM workflows (preferably Sentinel and Splunk)
Modern authentication systems and attacks (SSO, OATH, Entra, etc.)
Malware Detection, to include dynamic and light static analysis
Network Monitoring metadata (web logs, firewall logs, WAF/IDS)
Email Security and common business email compromise attacks
Windows and Unix forensic artifacts (i.e. registry analysis, wtmp/btmp)
Windows PE and Maldoc analysis
Remote access solutions (both legitimate and inherently malicious)
Lateral movement methodologies and tools for Windows & Unix-based OSes
O365 attack paths, common attacker methodologies, and analysis
Network metadata analysis and knowledge of commonly abused protocols
Credential harvesting tools and methodologies
Experience countering ransomware threat actors / operations preferred
Preferred Qualifications
Experience intrusion analysis / incident response, digital forensics, penetration testing, or related areas
5+ years of hands-on SOC/TOC/NOC experience
GIAC certification(s) strongly preferred. CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred
Familiarity with technologies such as Sentinel, Splunk, Microsoft Defender suites, Crowdstrike Falcon, SentinelOne
Familiarity with GPO, Landesk, or other IT Infrastructure tools
Understanding and/or experience with one or more programming languages: JavaScript, Python, Lua, Ruby, GoLang, Rust
Education
Minimum bachelor’s degree in information security, Computer Science, or other IT-related field or equivalent experience
About BlueVoyant At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics and technology, coupled with deep expertise, works as a force multiplier to secure your full ecosystem. Accuracy! Actionability! Timeliness! Scalability!
Led by CEO, Jim Rosenthal, BlueVoyant’s highly skilled team includes former government cyber officials with extensive frontline experience in responding to advanced cyber threats on behalf of the NSA, FBI, Unit 8200 and GCHQ, together with private sector experts. BlueVoyant services utilize large real-time datasets with industry leading analytics and technologies.
Founded in 2017 by Fortune 500 executives, including Executive Chairman, Tom Glocer, and former Government cyber officials, BlueVoyant is headquartered in New York City and has offices in Maryland, Tulsa, San Francisco, Leeds, London, Cork, Budapest, Tel Aviv and Latin America.
Legal Notice All employees must be authorized to work in the United States. BlueVoyant provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, BlueVoyant complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.
Disclaimer:
Please note that pursuant to contractual requirements and applicable law, in order for employees to perform work on some of the company’s federal contracts, U.S. citizenship is required. Accordingly, an employee’s ability to perform work on such contracts is contingent upon the company’s verification of the employee’s citizenship status.
BlueVoyant Candidate Privacy Notice
To understand how we secure and manage your personal data upon submitting a job application, please see our Candidate Privacy Notice, which can be found here - Candidate Privacy Notice
#J-18808-Ljbffr