SOC Security Analyst L2

Remote
Full Time
Security Operations Centre
Mid Level

Position: SOC Security Analyst L2
Location: Remote, US
Shift Requirement: : Wednesday to Saturday - Swing/Night Shift. Available options: (EST): 4pm-2am, 5pm-3am, 6pm-4am, 7pm-5am, 8pm-6am.

Work Authorization:  US Citizenship Required
 

Summary: 
BlueVoyant is seeking a Security Operations Center (SOC) Security Analyst L2 to help global customers manage and improve their cybersecurity posture. You will work in a fast-paced environment focused on minimizing the impact of security incidents and ensuring critical business operations remain uninterrupted. 

As a senior analyst, you serve as the technical expert and escalation point for junior analysts. Your deep understanding of modern attacks, intrusion data analysis, and remediation techniques ensures that threats are identified, escalated, and remediated with urgency and precision. You will mentor junior team members, support customers directly, and contribute to ongoing process and technology improvements. 
 

Key Responsibilities:
As a senior analyst, your primary responsibility is ensuring the safety and security of customer environments through expert analysis, escalation handling, and effective communication. 

  • Monitor and analyze security events and alerts from SIEM platforms, endpoint logs, network telemetry, and EDR tools 
  • ​​​​​​​Research indicators of compromise (IOCs) and malicious activity to determine reputation and risk 
  • Conduct malware analysis, attacker infrastructure investigation, and forensic analysis 
  • Execute complex investigations and declare incidents when appropriate Perform live response and remote forensics on compromised endpoints 
  • Conduct threat hunting activities based on behavioral anomalies and curated intelligence 
  • Participate in and support incident response, investigation, and documentation 
  • Collaborate closely with BlueVoyant Incident Response teams during active intrusions 
  • Ensure events are accurately identified, analyzed, escalated, and documented 
  • Identify and tune false positives and benign detections 
  • Perform peer reviews and QA checks on junior analysts’ investigations 
  • Mentor lower-level analysts and act as the technical escalation point 
  • Communicate regularly with clients regarding incidents, findings, and remediation steps 
  • Support Customer Success teams during client engagements as required 
  • Assist in improving security policies, procedures, tooling, and automation 

 
Basic Qualifications: 
People Skills 

  • Ability to remain calm and effective in high-pressure security incident situations 
  • ​​​​​​​Ability to work directly with customers to gather requirements and provide feedback on security services 
  • Strong written and verbal communication skills with the ability to translate complex technical concepts into clear, understandable language 
  • Strong teamwork and interpersonal skills; comfortable working with a globally distributed team 
  • Willingness and ability to work a 24/7/365 rotating shift schedule 

Technical Skills 

  • Experience using SIEM solutions, Cloud App Security tools, and EDR platforms
  • Advanced understanding of network protocols and network telemetry 
  • Knowledge of Windows and Unix forensic artifacts and analysis methods 
  • Expertise in endpoint, web, and authentication log analysis 
  • Experience creating SIEM/EDR detections 
  • Experience responding to modern authentication attacks (AD, Entra, OATH, etc.) 
  • Deep knowledge of common attack paths, including LOLBins, adversary tools, BEC attacks, AiTM, and lateral movement techniques 
  • Strong knowledge of: 
  • SIEM workflows (preferably Microsoft Sentinel or Splunk) 
  • Modern authentication systems and attacks (SSO, OATH, Entra) 
  • Malware detection and analysis (dynamic and light static) 
  • Network and firewall logs, IDS/WAF, web traffic logs 
  • Email security and BEC attack methodologies 
  • Windows and Unix forensic artifacts (registry, wtmp/btmp, etc.) 
  • Windows PE and malicious document analysis 
  • Legitimate and malicious remote access methods 
  • O365 attack paths and common adversary techniques 
  • Network metadata and commonly abused protocols 
  • Credential harvesting tools and methodologies 
  • Experience countering ransomware threat actors (preferred) 


Preferred Qualifications: ]

  • Experience in intrusion analysis, incident response, digital forensics, penetration testing, or similar fields 
  • 3+ years of hands-on SOC/TOC/NOC experience 
  • GIAC certification(s) strongly preferred 
  • Additional certifications such as CISSP, Security+, Network+, CEH, RHCA, RHCE, MCSA, MCP, MCSE 
  • Familiarity with tools such as Microsoft Sentinel, Splunk, Microsoft Defender suite, CrowdStrike Falcon, SentinelOne 
  • Familiarity with GPO, LANDesk, or other IT infrastructure tools 
  • Experience with one or more programming languages (JavaScript, Python, Lua, Ruby, Go, Rust) 

Education 

  • Bachelor’s degree in Information Security, Computer Science, or related IT field, or equivalent experience 

About BlueVoyant

At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics and technology, coupled with deep expertise, works as a force multiplier to secure your full ecosystem. Accuracy! Actionability! Timeliness! Scalability!

Led by CEO, Jim Rosenthal, BlueVoyant’s highly skilled team includes former government cyber officials with extensive frontline experience in responding to advanced cyber threats on behalf of the National Security Agency, Federal Bureau of Investigation, Unit 8200 and GCHQ, together

with private sector experts. BlueVoyant services utilize large real-time datasets with industry leading analytics and technologies.

Founded in 2017 by Fortune 500 executives, including Executive Chairman, Tom Glocer, and former Government cyber officials, BlueVoyant is headquartered in New York City and has offices in Maryland, Tulsa, San Francisco, Leeds, London, Cork, Budapest, Tel Aviv and Latin America.

All employees must be authorized to work in the United States. BlueVoyant provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, BlueVoyant complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.

Disclaimer: Please note that pursuant to contractual requirements and applicable law, in order for employees to perform work on some of the company’s federal contracts, U.S. citizenship is required. Accordingly, an employee’s ability to perform work on such contracts is contingent upon the company’s verification of the employee’s citizenship status.

Interview Expectations

As part of our interview process, we assess your experience through real-time discussion, so we expect responses to be your own. While we support the use of AI in our business, it is not permitted during interviews, and any suspected use may be challenged, including through detection methods.

BlueVoyant Candidate Privacy Notice

To understand how we secure and manage your personal data upon submitting a job application, please see our Candidate Privacy Notice, which can be found here - Candidate Privacy Notice

Share

Apply for this position

Required*
We've received your resume. Click here to update it.
Attach resume as .pdf, .doc, .docx, .odt, .txt, or .rtf (limit 5MB) or Paste resume

Paste your resume here or Attach resume file

To comply with government Equal Employment Opportunity and/or Affirmative Action reporting regulations, we are requesting (but NOT requiring) that you enter this personal data. This information will not be used in connection with any employment decisions, and will be used solely as permitted by state and federal law. Your voluntary cooperation would be appreciated. Learn more.
Human Check*