Soc Security Analyst III

Logo of BlueVoyant

BlueVoyant

πŸ“Remote - Worldwide

Job highlights

Summary

Join BlueVoyant as a Security Operations Center (SOC) Security Analyst III and become a key member of a fast-paced team dedicated to defending global customers against cyber threats. You will be responsible for handling active intrusions, mentoring junior analysts, and providing expert analysis of security incidents. This role requires advanced technical skills, excellent communication, and the ability to work effectively in a global team environment. The position offers a hybrid work schedule in the Philippines and the opportunity to contribute to a company with a strong reputation in cybersecurity. You will be the ultimate technical expert and escalation point for analysts on your team, ensuring that attacks against our clients are handled with urgency, accuracy, and effective communication.

Requirements

  • Ability to handle high pressure situations in a productive and professional manner
  • Ability to work directly with customers to understand requirements for and feedback on security services
  • Advanced written and verbal communication skills and the ability to present complex technical topics in clear and easy-to-understand language
  • Strong teamwork and interpersonal skills, including the ability to work effectively with a globally distributed team
  • Knowledge and experience with SIEM solutions, Cloud App Security tools, and EDR
  • Advanced knowledge and understanding of network protocols and network telemetry
  • Forensic artifact and analysis knowledge of Windows and Unix systems
  • Expertise in Endpoint, Web, and Authentication log analysis
  • Experience with SIEM/EDR detection creation
  • Experience in responding to modern authentication attacks against AD, Entra, OATH, etc
  • Expert knowledge of common attack paths, including LOLbin use, common adversary tools, business email compromises, AiTM attacks, including identification and response
  • Strong knowledge of the following: SIEM workflows (preferably Sentinel and Splunk)
  • Modern authentication systems and attacks SSO, OATH, Entra, etc
  • Malware Detection, to include dynamic and light static analysis
  • Network Monitoring metadata (web logs, firewall logs, WAF/IDS)
  • Email Security and common business email compromise attacks
  • Windows and Unix forensic artifacts (i.e., registry analysis, wtmp/btmp)
  • Windows PE and Maldoc analysis
  • Remote access solutions (both legitimate and inherently malicious)
  • Lateral movement methodologies and tools for Windows & Unix-based Oses
  • O365 attack paths, common attacker methodologies, and analysis
  • Network metadata analysis and knowledge of commonly abused protocols
  • Expert knowledge of credential harvesting tools and methodologies
  • Minimum bachelor's degree in information security, Computer Science, or other IT-related field or equivalent experience

Responsibilities

  • Handle active intrusions and escalations from junior analysts
  • Dive into client systems and logs to find attacker activity while tracing a labyrinth of domain registrations and ripping apart malware
  • Monitor and analyze security events and alerts from multiple sources, including SIEM logs, endpoint logs, and EDR telemetry
  • Research indicators and activities to determine reputation and suspicious attributes
  • Perform analysis of malware, attacker network infrastructure, and forensic artifacts
  • Execute complex investigations and handle incident declaration
  • Perform live response analysis of compromised endpoints
  • Hunt for suspicious activity based on anomalous activity and curated intelligence
  • Participate in the response, investigation, and resolution of security incidents
  • Provide incident investigation, handling, response, and incident documentation
  • Engage and assist the BlueVoyant Incident Response teams for active intrusions
  • Ensure events are properly identified, analyzed, and escalated to incidents
  • Assist in the advancement of security policies, procedures, and automation
  • Serve as the technical escalation point and mentor for lower-level analysts
  • Regularly communicate with clients to inform them of incidents and aid in remediation
  • Identification and tuning of false-positive or benign detections
  • Perform peer review and QA of junior analyst investigations
  • Support Customer Success team with client engagements when required

Preferred Qualifications

  • Experience intrusion analysis / incident response, digital forensics, penetration testing, or related areas
  • 5+ years of hands-on SOC/TOC/NOC experience
  • GIAC certification(s) strongly preferred. CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred
  • Familiarity with technologies such as Sentinel, Splunk, Microsoft Defender suites, Crowdstrike Falcon, SentinelOne
  • Familiarity with GPO, Landesk, or other IT Infrastructure tools
  • Understanding and/or experience with one or more of the following programming languages: JavaScript, Python, Lua, Ruby, GoLang, Rust

Benefits

Hybrid work schedule in the Philippines (50% in office)

Share this job:

Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.

Similar Remote Jobs

Please let BlueVoyant know you found this job on JobsCollider. Thanks! πŸ™