SOC Security Analyst L3 Job at BlueVoyant, College Park, MD

dEJDMnlIUVBtV1FVeE40UjIwN2owdzdzMUE9PQ==
  • BlueVoyant
  • College Park, MD

Job Description

SOC Security Analyst L3

Location: The requirement has been updated to work out of the College Park, Maryland office 4 days per week

Shift Requirement:
BlueVoyant's U.S. Commercial SOC operates on a four days on, three days off schedule. Analysts work one of the following options:

  • Sundays-Wednesdays: with analysts operating either
    • 6am-4pm
    • 8am-6pm
    • 10am-8pm
    • 8pm-6am (night shift)
  • Wednesdays-Saturdays: with analysts operating either
    • 6am-4pm
    • 8am-6pm
    • 10am-8pm
    • 8pm-6am (night shift)

US Citizenship Required

Summary

BlueVoyant is looking for Security Operations Center (SOC) Analysts to defend our global customers from the constant fight against adversaries. You will be part of a fast-paced team that helps spot, defend, and remediate adversary activity to reduce the impact and dwell time of security incidents. 

As an L3 analyst, you are the ultimate technical expert and escalation point for analysts on your team. Your significant expertise in modern attacks, analysis of intrusion data, and knowledge of attack remediation ensures that attacks against our clients are handled with urgency, accuracy, and effective communication. You are the mentor for L1/L2 analysts, the trusted voice of customers, and the bane of adversaries. The experience you bring to the role provides a front-row voice to technology strategy, process improvements, and an advocate for analysts around the world.  

Key Responsibilities:

As an L3 analyst the safety and security of your clients is your ultimate motivator and responsibility. You’ll handle active intrusions and escalations from L1 and L2 analysts, and you know how to dive into client systems and logs to find attacker activity while tracing a labyrinth of domain registrations and ripping apart malware. When you say “it’s bad” everyone jumps into action. 

Beyond technical expertise, you understand that the burden of proof is on you and requires excellent documentation and communication. Clients are not left with more questions than they started with when they read your reports and know exactly what actions they need to take to kick bad guys to the curb. 
  • Monitor and analyze security events and alerts from multiple sources, including SIEM logs, endpoint logs, and EDR telemetry
  • Research indicators and activities to determine reputation and suspicious attributes
  • Perform analysis of malware, attacker network infrastructure, and forensic artifacts
  • Execute complex investigations and handle incident declaration
  • Perform live response analysis of compromised endpoints
  • Hunt for suspicious activity based on anomalous activity and curated intelligence
  • Participate in the response, investigation, and resolution of security incidents.
  • Provide incident investigation, handling, response, and incident documentation
  • Engage and assist the BlueVoyant Incident Response teams for active intrusions
  • Ensure events are properly identified, analyzed, and escalated to incidents.
  • Assist in the advancement of security policies, procedures, and automation
  • Serve as the technical escalation point and mentor for lower-level analysts
  • Regularly communicate with clients to inform them of incidents and aid in remediation

Basic Qualifications

  1. People Skills:
    • Ability to handle high pressure situations in a productive and professional manner.
    • Ability to work directly with customers to understand requirements for and feedback on security services
    • Advanced written and verbal communication skills and the ability to present complex technical topics in clear and easy-to-understand language
    • Strong teamwork and interpersonal skills, including the ability to work effectively with a globally distributed team
    • Able and willing to work in a 24/7/365 environment, including nights and weekends, on a rotating shift schedule
  2. Tech Skills: 
    • Knowledge and experience with SIEM solutions, Cloud App Security tools, and EDR
    • Advanced knowledge and understanding of network protocols and network telemetry
    • Forensic artifact and analysis knowledge of Windows and Unix systems
    • Expertise in Endpoint, Web, and Authentication log analysis 
    • Experience with SIEM/EDR detection creation 
    • Experience in responding to modern authentication attacks against AD, Entra, OATH, etc.
    • Expert knowledge of common attack paths, including LOLbin use, common adversary tools, business email compromises, AiTM attacks, including identification and response
    • Strong knowledge of the following:
      • SIEM workflows (preferably Sentinel and Splunk)
      • Modern authentication systems and attacks (SSO, OATH, Entra, etc.) 
      • Malware Detection, to include dynamic and light static analysis
      • Network Monitoring metadata (web logs, firewall logs, WAF/IDS)
      • Email Security and common business email compromise attacks
      • Windows and Unix forensic artifacts (i.e. registry analysis, wtmp/btmp)
      • Windows PE and Maldoc analysis
      • Remote access solutions (both legitimate and inherently malicious)
      • Lateral movement methodologies and tools for Windows & Unix-based OSes
      • O365 attack paths, common attacker methodologies, and analysis
      • Network metadata analysis and knowledge of commonly abused protocols
      • Expert knowledge of credential harvesting tools and methodologies
      • Experience countering ransomware threat actors / operations preferred

Preferred Qualifications

  • Experience intrusion analysis / incident response, digital forensics, penetration testing, or related areas
  • 5+ years of hands-on SOC/TOC/NOC experience
  • GCIA and GCIH required. GCFA, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred
  • Familiarity with technologies such as Sentinel, Splunk, Microsoft Defender suites, Crowdstrike Falcon, SentinelOne
  • Familiarity with GPO, Landesk, or other IT Infrastructure tools
  • Understanding and/or experience with one or more of the following programming languages: JavaScript, Python, Lua, Ruby, GoLang, Rust

Education

  • Minimum bachelor’s degree in Information Security, Computer Science, or other IT-related field or equivalent experience

About BlueVoyant

At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics, and technology, coupled with deep expertise, works as a force multiplier to secure your full ecosystem. Accuracy! Actionability! Timeliness! Scalability!

Led by CEO, Jim Rosenthal, BlueVoyant’s highly skilled team includes former government cyber officials with extensive frontline experience in responding to advanced cyber threats on behalf of the National Security Agency, Federal Bureau of Investigation, Unit 8200, and GCHQ, together with private sector experts. BlueVoyant services utilize large real-time datasets with industry leading analytics and technologies.

Founded in 2017 by Fortune 500 executives, including Executive Chairman, Tom Glocer, and former Government cyber officials, BlueVoyant is headquartered in New York City and has offices in Maryland, Tel Aviv, San Francisco, London, Budapest, and Latin America.

All employees must be authorized to work in the United States. BlueVoyant provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, BlueVoyant complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.

Disclaimer: Please note that pursuant to contractual requirements and applicable law, in order for employees to perform work on some of the company’s federal contracts, U.S. citizenship is required. Accordingly, an employee’s ability to perform work on such contracts is contingent upon the company’s verification of the employee’s citizenship status. Furthermore, individuals may be subject to additional background checks and fingerprinting.

BlueVoyant Candidate Privacy Notice

To understand how we secure and manage your personal data upon submitting a job application, please see our Candidate Privacy Notice, which can be found here - Candidate Privacy Notice

Job Tags

Full time, Work at office, Local area, Night shift, Rotating shift, Sunday, Day shift, Saturday,

Similar Jobs

Eco Electric & Plumbing

Journeyman Plumber Job at Eco Electric & Plumbing

 ...performers are the highest-paid technicians in Seattle ~ Company-supplied truck that you can take home. ~ Medical Insurance we pay 90% for you and 85% of your familys insurance premiums for health, dental, vision, life insurance, short-term and long-term disability... 

Traveling with Tasha

Travel Industry Entrepreneur | Helping Others Build a Profitable Travel Business ✈️ Job at Traveling with Tasha

Job description Love to Travel? Imagine Getting Paid for It! As a travel industry entrepreneur and mentor, I help individuals start and grow their own travel businessesearning commissions, accessing exclusive perks, and creating financial freedom through the power... 

North Carolina Democratic Party

Goodwin Fellowship Spring 2018 Job at North Carolina Democratic Party

 ...of Goodwin Fellows. Being a Goodwin Fellow prepares students and young adults an opportunity to acquire in-depth knowledge of political campaigns, business operations, communications strategy, and state-of-the-art data tools used in the field. Goodwin Fellows will be... 

Friendship Automotive

Assistant Parts Manager - Chevy/GMC of Forest City Job at Friendship Automotive

 ...Team Members are family. Friendship is located in 5 states, 9 cities and has 21 locations with lots of opportunity for growth. Voted...  ...focused automotive group. We're looking for an ASSISTANT PARTS MANAGER to join our team at FRIENDSHIP CHEVY/GMC of FOREST CITY.Our... 

SAIC

Tier 3 SOC Manager Job at SAIC

 ...Applications International Corporation (SAIC) is seeking a SOC Manager/Tier 3 to join our team supporting a major state & local government...  ...work. Utilizes COTS/GOTS applications, ticketing systems, lab systems, forensic applications, and/or custom tools, techniques,...