Job Title: SOC Security Analyst L3
Location: Cork, Ireland
The schedule will be a Panama schedule: slow rotating shift pattern that uses 4 teams and two 12-hour shifts to provide 24/7 coverage. The working and non-working days follow this pattern: 2 days on, 2 days off, 3 days on, 2 days off, 2 days on, 3 days off.
Every 4 weeks, it will change from the day to the night shift.
Summary
BlueVoyant is looking for Security Operations Center (SOC) Analysts to defend our global customers from constant fight against adversaries. You will be part of fast-paced team that helps spot, defend, and remediate adversary activity to reduce impact and dwell time of security incidents.
Key Responsibilities
* Monitor and analyze security events and alerts from multiple sources, including SIEM logs, endpoint logs, and EDR telemetry.
* Research indicators and activities to determine reputation and suspicious attributes.
* Perform analysis of malware, attacker network infrastructure, and forensic artifacts.
* Execute complex investigations and handle incident declaration.
* Perform live response analysis of compromised endpoints.
* Hunt for suspicious activity based on anomalous activity and curated intelligence.
* Participate in response, investigation, and resolution of security incidents.
* Provide incident investigation, handling, response, and incident documentation.
* Engage and assist BlueVoyant Incident Response teams for active intrusions.
* Ensure events are properly identified, analyzed, and escalated to incidents.
* Perform peer review and QA of junior analyst investigations.
* Support Customer Success team with client engagements when required.
Basic Qualifications
People Skills
* Ability to handle high pressure situations in productive and professional manner.
* Ability to work directly with customers to understand requirements for and feedback on security services.
* Advanced written and verbal communication skills and ability to present complex technical topics in clear and easy-to-understand language.
* Strong teamwork and interpersonal skills, including ability to work effectively with globally distributed team.
* Able and willing to work in 24/7/365 environment, including nights and weekends, on rotating shift schedule.
Tech Skills
* Knowledge and experience with SIEM solutions, Cloud App Security tools, and EDR.
* Advanced knowledge and understanding of network protocols and network telemetry.
* Forensic artifact and analysis knowledge of Windows and Unix systems.
* Expertise in Endpoint, Web, and Authentication log analysis.
* Experience with SIEM/EDR detection creation.
* Experience in responding to modern authentication attacks against AD, Entra, OATH, etc.
* Expert knowledge of common attack paths, including LOLbin use, common adversary tools, business email compromises, AiTM attacks, including identification and response.
* Strong knowledge of following:
o SIEM workflows (preferably Sentinel and Splunk).
o Modern authentication systems and attacks SSO, OATH, Entra, etc.
o Malware Detection, to include dynamic and light static analysis.
o Network Monitoring metadata (web logs, firewall logs, WAF/IDS).
o Email Security and common business email compromise attacks.
o Windows and Unix forensic artifacts (i.e., registry analysis, wtmp/btmp).
o Windows PE and Maldoc analysis.
o Remote access solutions (both legitimate and inherently malicious).
o Lateral movement methodologies and tools for Windows & Unix-based OSes.
o O365 attack paths, common attacker methodologies, and analysis.
o Network metadata analysis and knowledge of commonly abused protocols.
o Expert knowledge of credential harvesting tools and methodologies.
o Experience countering ransomware threat actors / operations preferred.
Preferred Qualifications
* Experience intrusion analysis / incident response, digital forensics, penetration testing, or related areas.
* 5+ years of hands-on SOC/TOC/NOC experience.
* GIAC certification(s) strongly preferred. CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred.
* Familiarity with technologies such as Sentinel, Splunk, Microsoft Defender suites, Crowdstrike Falcon, SentinelOne.
* Familiarity with GPO, Landesk, or other IT Infrastructure tools.
* Understanding and/or experience with one or more of following programming languages: JavaScript, Python, Lua, Ruby, GoLang, Rust.
Education
* Minimum bachelor's degree in information security, Computer Science, or other IT-related field or equivalent experience.
About BlueVoyant
At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics, and technology, coupled with deep expertise, works as force multiplier to secure full ecosystem. Accuracy Actionability Timeliness Scalability
Led by CEO, Jim Rosenthal, BlueVoyant's highly skilled team includes former government cyber officials with extensive frontline experience in responding to advanced cyber threats on behalf of National Security Agency, Federal Bureau of Investigation, Unit 8200, and GCHQ, together with private sector experts. BlueVoyant services utilize large real-time datasets with industry leading analytics and technologies.
Founded in 2017 by Fortune 500 executives, including Executive Chairman, Tom Glocer, and former Government cyber officials, BlueVoyant is headquartered in New York City and has offices in Maryland, Tel Aviv, San Francisco, London, Budapest, and Latin America.
All employees must be authorized to work in Republic of Ireland. BlueVoyant provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, BlueVoyant complies with applicable state and local laws governing non-discrimination in employment in every location in which company has facilities.
BlueVoyant Candidate Privacy Notice
To understand how we secure and manage your personal data upon submitting job application, please see our Candidate Privacy Notice, which can be found here - Candidate Privacy Notice