BlueVoyant · 23 hours ago
SOC Security Analyst 2
Maximize your interview chances
Insider Connection @BlueVoyant
Get 3x more responses when you reach out via email instead of LinkedIn.
Responsibilities
Monitor and analyze security events and alerts from multiple sources, including security information and event management (SIEM) software, network and host-based intrusion detection systems, firewall logs, and system logs (Windows and Unix), and databases
Separate true threats from false positives using network and log analysis and escalate possible intrusions and attacks
Initiate tickets, document, and escalate to higher-level security analysts
Serve as the technical escalation point and mentor for lower-level analysts
Regularly communicate with customer IT teams to inform them of issues, help them remediate, and ensure that they continue to operate business as usual
Perform triage of incoming issues (assess the priority, determine risk)
Work with customers to deploy hardware and software monitoring systems
Maintain a strong awareness of the current threat landscape.
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
Excellent teamwork skills
Knowledge of and experience with intrusion detection/prevention systems and SIEM software
Strong knowledge and understanding of network protocols and devices.
Strong experience with Mac OS, Windows, and Unix systems.
Ability to analyze event logs and recognize signs of cyber intrusions/attacks
Ability to handle high pressure situations in a productive and professional manner.
Ability to work directly with customers to understand requirements for and feedback on security services
Strong written and verbal communication skills and the ability to present complex technical topics in clear and easy-to-understand language
Strong teamwork and interpersonal skills, including the ability to work effectively with a globally distributed team
Able and willing to work in a 24/7/365 environment, including nights and weekends, on a rotating shift schedule
Ability to provide tuning recommendations for security tools to tool administrators.
Familiarity with tools such as Wireshark, TCP Dump, Security Onion, and Splunk
Strong knowledge of SIEM
Strong knowledge of Packet Analysis
Strong knowledge of SSL Decryption
Strong knowledge of Malware Detection
Strong knowledge of HIDS/NIDS
Strong knowledge of Network Monitoring Tools
Strong knowledge of Case Management System
Strong knowledge of Knowledge Base
Strong knowledge of Web Security Gateway
Strong knowledge of Email Security
Strong knowledge of Data Loss Prevention
Strong knowledge of Anti-Virus
Preferred
Experience in network/host vulnerability analysis, intrusion analysis, digital forensics, penetration testing, or related areas
2-4 years of hands-on SOC/TOC/NOC experience
GCIA required. GCIH, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred
Familiarity with tools such as IDA Pro, PEiD, PEview, Procmon, Snort, Bro, Kali Linux, Metasploit, NMAP, and Nessus
Familiarity with GPO, Landesk, or other IT Infrastructure tools
Understanding of programming/scripting languages and ability to run basic database queries
Exceptional candidates with proven experience in security/network operations will also be considered.
Company
BlueVoyant
BlueVoyant provides advanced threat intelligence, managed security services, and cybersecurity consulting to businesses and organizations.
Funding
Current Stage
Late StageTotal Funding
$665.5MKey Investors
Liberty Strategic CapitalManhattan Venture Partners (MVP)Temasek Holdings
2023-11-29Series E· $140M
2023-04-24Secondary Market· Undisclosed
2022-02-23Series D· $250M
Leadership Team
Recent News
2024-11-05
2024-05-23
Company data provided by crunchbase