SOC Security Analyst L2
Apply for this position → Go ad-free with PremiumPosition: SOC Security Analyst L2 Location: Remote, US Shift Requirement: : Wednesday to Saturday - Swing/Night Shift. Available options: (EST): 4pm-2am, 5pm-3am, 6pm-4am, 7pm-5am, 8pm-6am. Work Authorization: US Citizenship Required
Summary: BlueVoyant is seeking a Security Operations Center (SOC) Security Analyst L2 to help global customers manage and improve their cybersecurity posture. You will work in a fast-paced environment focused on minimizing the impact of security incidents and ensuring critical business operations remain uninterrupted.
As a senior analyst, you serve as the technical expert and escalation point for junior analysts. Your deep understanding of modern attacks, intrusion data analysis, and remediation techniques ensures that threats are identified, escalated, and remediated with urgency and precision. You will mentor junior team members, support customers directly, and contribute to ongoing process and technology improvements.
Key Responsibilities: As a senior analyst, your primary responsibility is ensuring the safety and security of customer environments through expert analysis, escalation handling, and effective communication.
Monitor and analyze security events and alerts from SIEM platforms, endpoint logs, network telemetry, and EDR tools
Research indicators of compromise (IOCs) and malicious activity to determine reputation and risk
Conduct malware analysis, attacker infrastructure investigation, and forensic analysis
Execute complex investigations and declare incidents when appropriate Perform live response and remote forensics on compromised endpoints
Conduct threat hunting activities based on behavioral anomalies and curated intelligence
Participate in and support incident response, investigation, and documentation
Collaborate closely with BlueVoyant Incident Response teams during active intrusions
Ensure events are accurately identified, analyzed, escalated, and documented
Identify and tune false positives and benign detections
Perform peer reviews and QA checks on junior analysts’ investigations
Mentor lower-level analysts and act as the technical escalation point
Communicate regularly with clients regarding incidents, findings, and remediation steps
Support Customer Success teams during client engagements as required
Assist in improving security policies, procedures, tooling, and automation
Basic Qualifications: People Skills
Ability to remain calm and effective in high-pressure security incident situations
Ability to work directly with customers to gather requirements and provide feedback on security services
Strong written and verbal communication skills with the ability to translate complex technical concepts into clear, understandable language
Strong teamwork and interpersonal skills; comfortable working with a globally distributed team
Willingness and ability to work a 24/7/365 rotating shift schedule
Technical Skills
Experience using SIEM solutions, Cloud App Security tools, and EDR platforms
Advanced understanding of network protocols and network telemetry
Knowledge of Windows and Unix forensic artifacts and analysis methods
Expertise in endpoint, web, and authentication log analysis
Experience creating SIEM/EDR detections
Experience responding to modern authentication attacks (AD, Entra, OATH, etc.)
Deep knowledge of common attack paths, including LOLBins, adversary tools, BEC attacks, AiTM, and lateral movement techniques
Strong knowledge of:
SIEM workflows (preferably Microsoft Sentinel or Splunk)
Modern authentication systems and attacks (SSO, OATH, Entra)
Malware detection and analysis (dynamic and light static)
Network and firewall logs, IDS/WAF, web traffic logs
Email security and BEC attack methodologies
Windows and Unix forensic artifacts (registry, wtmp/btmp, etc.)
Windows PE and malicious document analysis
Legitimate and malicious remote access methods
O365 attack paths and common adversary techniques
Network metadata and commonly abused protocols
Credential harvesting tools and methodologies
Experience countering ransomware threat actors (preferred)
Preferred Qualifications: ]
Experience in intrusion analysis, incident response, digital forensics, penetration testing, or similar fields
3+ years of hands-on SOC/TOC/NOC experience
GIAC certification(s) strongly preferred
Additional certifications such as CISSP, Security+, Network+, CEH, RHCA, RHCE, MCSA, MCP, MCSE
Familiarity with tools such as Microsoft Sentinel, Splunk, Microsoft Defender suite, CrowdStrike Falcon, SentinelOne
Familiarity with GPO, LANDesk, or other IT infrastructure tools
Experience with one or more programming languages (JavaScript, Python, Lua, Ruby, Go, Rust)
Education
Bachelor’s degree in Information Security, Computer Science, or related IT field, or equivalent experience
About BlueVoyant
At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics and technology, coupled with deep expertise, works as a force multiplier to secure your full ecosystem. Accuracy! Actionability! Timeliness! Scalability!
Led by CEO, Jim Rosenthal, BlueVoyant’s highly skilled team includes former government cyber officials with extensive frontline experience in responding to advanced cyber threats on behalf of the National Security Agency, Federal Bureau of Investigation, Unit 8200 and GCHQ, together
with private sector experts. BlueVoyant services utilize large real-time datasets with industry leading analytics and technologies.
Founded in 2017 by Fortune 500 executives, including Executive Chairman, Tom Glocer, and former Government cyber officials, BlueVoyant is headquartered in New York City and has offices in Maryland, Tulsa, San Francisco, Leeds, London, Cork, Budapest, Tel Aviv and Latin America.
All employees must be authorized to work in the United States. BlueVoyant provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, BlueVoyant complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.
Disclaimer: Please note that pursuant to contractual requirements and applicable law, in order for employees to perform work on some of the company’s federal contracts, U.S. citizenship is required. Accordingly, an employee’s ability to perform work on such contracts is contingent upon the company’s verification of the employee’s citizenship status.
Interview Expectations
As part of our interview process, we assess your experience through real-time discussion, so we expect responses to be your own. While we support the use of AI in our business, it is not permitted during interviews, and any suspected use may be challenged, including through detection methods.
BlueVoyant Candidate Privacy Notice
To understand how we secure and manage your personal data upon submitting a job application, please see our Candidate Privacy Notice, which can be found here - Candidate Privacy Notice
Similar Jobs
Intern - Information Security Operations
Viatris · USA
Cybersecurity Analyst II
D-Wave Quantum · USA
Senior Cyber Security Analyst - Application & Infrastructure
iRhythm · USA
Senior Cybersecurity Engineer
Abbott · USA
Senior IT Analyst
Mercury · Canada,USA
SOC Security Analyst L2
Position: SOC Security Analyst L2 Location: Remote, US Shift Requirement: : Wednesday to Saturday - Swing/Night Shift. Available options: (EST): 4pm-2am, 5pm-3am, 6pm-4am, 7pm-5am, 8pm-6am. Work Authorization: US Citizenship Required
Summary: BlueVoyant is seeking a Security Operations Center (SOC) Security Analyst L2 to help global customers manage and improve their cybersecurity posture. You will work in a fast-paced environment focused on minimizing the impact of security incidents and ensuring critical business operations remain uninterrupted.
As a senior analyst, you serve as the technical expert and escalation point for junior analysts. Your deep understanding of modern attacks, intrusion data analysis, and remediation techniques ensures that threats are identified, escalated, and remediated with urgency and precision. You will mentor junior team members, support customers directly, and contribute to ongoing process and technology improvements.
Key Responsibilities: As a senior analyst, your primary responsibility is ensuring the safety and security of customer environments through expert analysis, escalation handling, and effective communication.
Monitor and analyze security events and alerts from SIEM platforms, endpoint logs, network telemetry, and EDR tools
Research indicators of compromise (IOCs) and malicious activity to determine reputation and risk
Conduct malware analysis, attacker infrastructure investigation, and forensic analysis
Execute complex investigations and declare incidents when appropriate Perform live response and remote forensics on compromised endpoints
Conduct threat hunting activities based on behavioral anomalies and curated intelligence
Participate in and support incident response, investigation, and documentation
Collaborate closely with BlueVoyant Incident Response teams during active intrusions
Ensure events are accurately identified, analyzed, escalated, and documented
Identify and tune false positives and benign detections
Perform peer reviews and QA checks on junior analysts’ investigations
Mentor lower-level analysts and act as the technical escalation point
Communicate regularly with clients regarding incidents, findings, and remediation steps
Support Customer Success teams during client engagements as required
Assist in improving security policies, procedures, tooling, and automation
Basic Qualifications: People Skills
Ability to remain calm and effective in high-pressure security incident situations
Ability to work directly with customers to gather requirements and provide feedback on security services
Strong written and verbal communication skills with the ability to translate complex technical concepts into clear, understandable language
Strong teamwork and interpersonal skills; comfortable working with a globally distributed team
Willingness and ability to work a 24/7/365 rotating shift schedule
Technical Skills
Experience using SIEM solutions, Cloud App Security tools, and EDR platforms
Advanced understanding of network protocols and network telemetry
Knowledge of Windows and Unix forensic artifacts and analysis methods
Expertise in endpoint, web, and authentication log analysis
Experience creating SIEM/EDR detections
Experience responding to modern authentication attacks (AD, Entra, OATH, etc.)
Deep knowledge of common attack paths, including LOLBins, adversary tools, BEC attacks, AiTM, and lateral movement techniques
Strong knowledge of:
SIEM workflows (preferably Microsoft Sentinel or Splunk)
Modern authentication systems and attacks (SSO, OATH, Entra)
Malware detection and analysis (dynamic and light static)
Network and firewall logs, IDS/WAF, web traffic logs
Email security and BEC attack methodologies
Windows and Unix forensic artifacts (registry, wtmp/btmp, etc.)
Windows PE and malicious document analysis
Legitimate and malicious remote access methods
O365 attack paths and common adversary techniques
Network metadata and commonly abused protocols
Credential harvesting tools and methodologies
Experience countering ransomware threat actors (preferred)
Preferred Qualifications: ]
Experience in intrusion analysis, incident response, digital forensics, penetration testing, or similar fields
3+ years of hands-on SOC/TOC/NOC experience
GIAC certification(s) strongly preferred
Additional certifications such as CISSP, Security+, Network+, CEH, RHCA, RHCE, MCSA, MCP, MCSE
Familiarity with tools such as Microsoft Sentinel, Splunk, Microsoft Defender suite, CrowdStrike Falcon, SentinelOne
Familiarity with GPO, LANDesk, or other IT infrastructure tools
Experience with one or more programming languages (JavaScript, Python, Lua, Ruby, Go, Rust)
Education
Bachelor’s degree in Information Security, Computer Science, or related IT field, or equivalent experience
About BlueVoyant
At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics and technology, coupled with deep expertise, works as a force multiplier to secure your full ecosystem. Accuracy! Actionability! Timeliness! Scalability!
Led by CEO, Jim Rosenthal, BlueVoyant’s highly skilled team includes former government cyber officials with extensive frontline experience in responding to advanced cyber threats on behalf of the National Security Agency, Federal Bureau of Investigation, Unit 8200 and GCHQ, together
with private sector experts. BlueVoyant services utilize large real-time datasets with industry leading analytics and technologies.
Founded in 2017 by Fortune 500 executives, including Executive Chairman, Tom Glocer, and former Government cyber officials, BlueVoyant is headquartered in New York City and has offices in Maryland, Tulsa, San Francisco, Leeds, London, Cork, Budapest, Tel Aviv and Latin America.
All employees must be authorized to work in the United States. BlueVoyant provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, BlueVoyant complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.
Disclaimer: Please note that pursuant to contractual requirements and applicable law, in order for employees to perform work on some of the company’s federal contracts, U.S. citizenship is required. Accordingly, an employee’s ability to perform work on such contracts is contingent upon the company’s verification of the employee’s citizenship status.
Interview Expectations
As part of our interview process, we assess your experience through real-time discussion, so we expect responses to be your own. While we support the use of AI in our business, it is not permitted during interviews, and any suspected use may be challenged, including through detection methods.
BlueVoyant Candidate Privacy Notice
To understand how we secure and manage your personal data upon submitting a job application, please see our Candidate Privacy Notice, which can be found here - Candidate Privacy Notice
Similar Jobs
Intern - Information Security Operations
Viatris · USA
Cybersecurity Analyst II
D-Wave Quantum · USA
Senior Cyber Security Analyst - Application & Infrastructure
iRhythm · USA
Senior Cybersecurity Engineer
Abbott · USA
Senior IT Analyst
Mercury · Canada,USA