Logo
BlueVoyant

SOC Team Lead

BlueVoyant, Baltimore, Maryland, United States,


SOC Team LeadThis position is located in College Park, Maryland.The schedule will be a Panama schedule: (slow rotating shift pattern that uses 4 teams and two 12-hour shifts to provide 24/7 coverage. The working and non-working days follow this pattern: 2 days on, 2 days off, 3 days on, 2 days off, 2 days on, 3 days off)BlueVoyant is looking for a Security Operations Center (SOC) Team Lead to help our global customers manage their IT security. You will be part of a fast-paced team that helps customers to reduce the impact of security incidents and ensures that critical business operations continue unhindered.Key ResponsibilitiesProvides supervision and oversight for Security Analysts during a standard working team/shiftAssumes full responsibility and accountability for ensuring that customers receive world-class service from Security Analysts assigned to their shiftAssigns Security Analysts to information security events and oversees investigations as necessaryAssumes responsibility for issues and requests escalated by Security Analysts and executes additional escalations as necessarySupervise operations in deterring, identifying, monitoring, investigating, and analyzing computer network intrusionsSupervises complex event investigation and incident declarationEnsure events are properly identified, analyzed, and escalated to incidentsHunt for suspicious activity based on anomalous activity and indicators of compromise from various intelligence feeds and toolsetsParticipate in the response, investigation, and resolution of security incidentsCreate knowledge base articles for handling medium and high severity incidentsAssist in the advancement of security policies, procedures, and automationMonitor and analyze security events and alerts from multiple sources, including security information and event management (SIEM) software, network and host-based intrusion detection systems, firewall logs, and system logs (Windows and Unix), and databasesSeparate true threats from false positives using network and log analysis and escalate possible intrusions and attacksProvide incident investigation, handling, and response to include incident documentationInitiate tickets, document, and escalate to higher-level security analystsDevelop incident response reporting and policy updates as neededPerform computer and network forensic analysisServe as the technical escalation point and mentor for lower-level analystsRegularly communicate with customer IT teams to inform them of issues, help them remediate, and ensure that they continue to operate business as usualPerform triage of incoming issues (assess the priority, determine risk)Work with customers to deploy hardware and software monitoring systemsMaintain a strong awareness of the current threat landscapeBasic QualificationsExcellent teamwork skillsKnowledge of and experience with intrusion detection/prevention systems and SIEM softwareAdvanced knowledge and understanding of network protocols and devices.Advanced experience with Mac OS, Windows, and Unix systems.Ability to analyze event logs and recognize signs of cyber intrusions/attacksAbility to handle high-pressure situations in a productive and professional manner.Ability to work directly with customers to understand requirements for and feedback on security servicesAdvanced written and verbal communication skills and the ability to present complex technical topics in clear and easy-to-understand languageStrong teamwork and interpersonal skills, including the ability to work effectively with a globally distributed teamAble and willing to work in a 24/7/365 environment, including nights and weekends, on a rotating shift scheduleAbility to create signatures for security toolsFamiliarity with tools such as Wireshark, TCP Dump, Security Onion, and SplunkStrong knowledge of the following:

SIEMPacket AnalysisSSL DecryptionMalware DetectionHIDS/NIDSNetwork Monitoring ToolsCase Management SystemKnowledge BaseWeb Security GatewayEmail SecurityData Loss PreventionAnti-VirusNetwork Access ControlEncryptionVulnerability Identification

Preferred CompetenciesExperience in network/host vulnerability analysis, intrusion analysis, digital forensics, penetration testing, or related areas5+ years of hands-on SOC/TOC/NOC experienceGCIA and/or GCIH required. GCFA, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferredFamiliarity with tools such as IDA Pro, PEiD, PEview, Procmon, Snort, Bro, Kali Linux, Metasploit, NMAP, and NessusFamiliarity with GPO, Landesk, or other IT Infrastructure toolsUnderstanding and/or experience with one or more of the following programming languages: .NET, PHP, Perl, Python, Java, Ruby, C, C++.EducationMinimum bachelor’s degree in Information Security, Computer Science, or other IT-related fieldExceptional candidates with proven experience in security/network operations will also be considered

#J-18808-Ljbffr