BlueVoyant
SOC Security Analyst L3
BlueVoyant, College Park, Maryland, us, 20741
SOC Security Analyst L3This position is ideally located in College Park, Maryland. Remote US candidates may be considered.The schedule will be a Panama schedule: (slow rotating shift pattern that uses 4 teams and two 12-hour shifts to provide 24/7 coverage. The working and non-working days follow this pattern: 2 days on, 2 days off, 3 days on, 2 days off, 2 days on, 3 days off)US Citizenship RequiredSummaryBlueVoyant is looking for Security Operations Center (SOC) Analysts to defend our global customers from the constant fight against adversaries. You will be part of a fast-paced team that helps spot, defend, and remediate adversary activity to reduce the impact and dwell time of security incidents.As an L3 analyst, you are the ultimate technical expert and escalation point for analysts on your team. Your significant expertise in modern attacks, analysis of intrusion data, and knowledge of attack remediation ensures that attacks against our clients are handled with urgency, accuracy, and effective communication. You are the mentor for L1/L2 analysts, the trusted voice of customers, and the bane of adversaries.Key Responsibilities:Monitor and analyze security events and alerts from multiple sources, including SIEM logs, endpoint logs, and EDR telemetryResearch indicators and activities to determine reputation and suspicious attributesPerform analysis of malware, attacker network infrastructure, and forensic artifactsExecute complex investigations and handle incident declarationPerform live response analysis of compromised endpointsHunt for suspicious activity based on anomalous activity and curated intelligenceParticipate in the response, investigation, and resolution of security incidents.Provide incident investigation, handling, response, and incident documentationEnsure events are properly identified, analyzed, and escalated to incidents.Assist in the advancement of security policies, procedures, and automationServe as the technical escalation point and mentor for lower-level analystsRegularly communicate with clients to inform them of incidents and aid in remediationBasic QualificationsPeople Skills:
Ability to handle high pressure situations in a productive and professional manner.Ability to work directly with customers to understand requirements for and feedback on security servicesAdvanced written and verbal communication skills and the ability to present complex technical topics in clear and easy-to-understand languageStrong teamwork and interpersonal skills, including the ability to work effectively with a globally distributed teamAble and willing to work in a 24/7/365 environment, including nights and weekends, on a rotating shift schedule
Knowledge and experience with SIEM solutions, Cloud App Security tools, and EDRAdvanced knowledge and understanding of network protocols and network telemetryForensic artifact and analysis knowledge of Windows and Unix systemsExpertise in Endpoint, Web, and Authentication log analysisExperience with SIEM/EDR detection creationExperience in responding to modern authentication attacks against AD, Entra, OATH, etc.Expert knowledge of common attack paths, including LOLbin use, common adversary tools, business email compromises, AiTM attacks, including identification and responseStrong knowledge of the following:
SIEM workflows (preferably Sentinel and Splunk)Modern authentication systems and attacks (SSO, OATH, Entra, etc.)Malware Detection, to include dynamic and light static analysisNetwork Monitoring metadata (web logs, firewall logs, WAF/IDS)Email Security and common business email compromise attacksWindows and Unix forensic artifacts (i.e. registry analysis, wtmp/btmp)Windows PE and Maldoc analysisRemote access solutions (both legitimate and inherently malicious)Lateral movement methodologies and tools for Windows & Unix-based OSesO365 attack paths, common attacker methodologies, and analysisNetwork metadata analysis and knowledge of commonly abused protocolsExpert knowledge of credential harvesting tools and methodologiesExperience countering ransomware threat actors / operations preferred
Preferred QualificationsExperience intrusion analysis / incident response, digital forensics, penetration testing, or related areas5+ years of hands-on SOC/TOC/NOC experienceGCIA and GCIH required. GCFA, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferredFamiliarity with technologies such as Sentinel, Splunk, Microsoft Defender suites, Crowdstrike Falcon, SentinelOneFamiliarity with GPO, Landesk, or other IT Infrastructure toolsEducationMinimum bachelor’s degree in Information Security, Computer Science, or other IT-related field or equivalent experience
#J-18808-Ljbffr
Ability to handle high pressure situations in a productive and professional manner.Ability to work directly with customers to understand requirements for and feedback on security servicesAdvanced written and verbal communication skills and the ability to present complex technical topics in clear and easy-to-understand languageStrong teamwork and interpersonal skills, including the ability to work effectively with a globally distributed teamAble and willing to work in a 24/7/365 environment, including nights and weekends, on a rotating shift schedule
Knowledge and experience with SIEM solutions, Cloud App Security tools, and EDRAdvanced knowledge and understanding of network protocols and network telemetryForensic artifact and analysis knowledge of Windows and Unix systemsExpertise in Endpoint, Web, and Authentication log analysisExperience with SIEM/EDR detection creationExperience in responding to modern authentication attacks against AD, Entra, OATH, etc.Expert knowledge of common attack paths, including LOLbin use, common adversary tools, business email compromises, AiTM attacks, including identification and responseStrong knowledge of the following:
SIEM workflows (preferably Sentinel and Splunk)Modern authentication systems and attacks (SSO, OATH, Entra, etc.)Malware Detection, to include dynamic and light static analysisNetwork Monitoring metadata (web logs, firewall logs, WAF/IDS)Email Security and common business email compromise attacksWindows and Unix forensic artifacts (i.e. registry analysis, wtmp/btmp)Windows PE and Maldoc analysisRemote access solutions (both legitimate and inherently malicious)Lateral movement methodologies and tools for Windows & Unix-based OSesO365 attack paths, common attacker methodologies, and analysisNetwork metadata analysis and knowledge of commonly abused protocolsExpert knowledge of credential harvesting tools and methodologiesExperience countering ransomware threat actors / operations preferred
Preferred QualificationsExperience intrusion analysis / incident response, digital forensics, penetration testing, or related areas5+ years of hands-on SOC/TOC/NOC experienceGCIA and GCIH required. GCFA, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferredFamiliarity with technologies such as Sentinel, Splunk, Microsoft Defender suites, Crowdstrike Falcon, SentinelOneFamiliarity with GPO, Landesk, or other IT Infrastructure toolsEducationMinimum bachelor’s degree in Information Security, Computer Science, or other IT-related field or equivalent experience
#J-18808-Ljbffr