Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
SOC Analyst Level 2 image - Rise Careers
Job details

SOC Analyst Level 2

SOC Analyst Level 2Location: Hybrid from Tulsa, OK location as a preference.This role requires shift work as follows: 4 X 10 Wednesday - Saturday. (12pm – 11pm Central with 1 hour for lunch)US Citizenship required.BlueVoyant is looking for Security Operations Center (SOC) Analysts to help our global customers manage their IT security. You will be part of a fast-paced team that helps customers to reduce the impact of security incidents and ensures that critical business operations continue unhindered.Responsibilities• Monitor and analyze security events and alerts from multiple sources, including security information and event management (SIEM) software, network and host-based intrusion detection systems, firewall logs, and system logs (Windows and Unix), and databases• Separate true threats from false positives using network and log analysis and escalate possible intrusions and attacks• Initiate tickets, document, and escalate to higher-level security analysts when required• Serve as the technical escalation point and mentor for lower-level analysts• Regularly communicate with customer IT teams to inform them of issues, help them remediate, and ensure that they continue to operate business as usual• Perform triage of incoming issues (assess the priority, determine risk).• Work with customers to deploy hardware and software monitoring systems• Maintain a strong awareness of the current threat landscape.Qualifications• Excellent teamwork skills• Knowledge of and experience with intrusion detection/prevention systems and SIEM software• Strong knowledge and understanding of network protocols and devices.• Strong experience with Mac OS, Windows, and Unix systems.• Ability to analyze event logs and recognize signs of cyber intrusions/attacks• Ability to handle high pressure situations in a productive and professional manner.• Ability to work directly with customers to understand requirements for and feedback on security services• Strong written and verbal communication skills and the ability to present complex technical topics in clear and easy-to-understand language• Strong teamwork and interpersonal skills, including the ability to work effectively with a globally distributed team• Able and willing to work in a 24/7/365 environment, including nights and weekends, on a rotating shift schedule• Ability to provide tuning recommendations for security tools to tool administrators.• Familiarity with tools such as Wireshark, TCP Dump, Security Onion, and Splunk• Strong knowledge of the following:• SIEM• Packet Analysis• SSL Decryption• Malware Detection• HIDS/NIDS• Network Monitoring Tools• Case Management System• Knowledge Base• Web Security Gateway• Email Security• Data Loss Prevention• Anti-VirusPreferred Qualifications• Experience in network/host vulnerability analysis, intrusion analysis, digital forensics, penetration testing, or related areas• 1-4 years of hands-on SOC/TOC/NOC experience• GCIA required. GCIH, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred• Familiarity with tools such as IDA Pro, PEiD, PEview, Procmon, Snort, Bro, Kali Linux, Metasploit, NMAP, and Nessus• Familiarity with GPO, Landesk, or other IT Infrastructure tools• Understanding of programming/scripting languages and ability to run basic database queriesEducation• Minimum bachelor’s degree in Information Security in Computer Science, other IT-related field, or equivalent professional experience. Exceptional candidates with proven experience in security/network operations will also be considered.About BlueVoyantAt BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics, and technology, coupled with deep expertise, works as a force multiplier to secure your full ecosystem. Accuracy! Actionability! Timeliness! Scalability!Led by CEO, Jim Rosenthal, BlueVoyant’s highly skilled team includes former government cyber officials with extensive frontline experience in responding to advanced cyber threats on behalf of the National Security Agency, Federal Bureau of Investigation, Unit 8200, and GCHQ, together with private sector experts. BlueVoyant services utilize large real-time datasets with industry leading analytics and technologies.Founded in 2017 by Fortune 500 executives, including Executive Chairman, Tom Glocer, and former Government cyber officials, BlueVoyant is headquartered in New York City and has offices in Maryland, Tel Aviv, San Francisco, London, Budapest, and Latin America.All employees must be authorized to work in the United States. BlueVoyant provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, BlueVoyant complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.Disclaimer: Please note that pursuant to contractual requirements and applicable law, in order for employees to perform work on some of the company’s federal contracts, U.S. citizenship is required. Accordingly, an employee’s ability to perform work on such contracts is contingent upon the company’s verification of the employee’s citizenship status. Furthermore, individuals may be subject to additional background checks and fingerprinting.
BlueVoyant Glassdoor Company Review
3.9 Glassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon Glassdoor star icon
BlueVoyant DE&I Review
4.1 Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon
CEO of BlueVoyant
BlueVoyant CEO photo
Unknown name
Approve of CEO

Average salary estimate

Estimate provided by employer
$70000 / ANNUAL (est.)
min
max
$60K
$80K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About SOC Analyst Level 2, BlueVoyant

Join BlueVoyant as a SOC Analyst Level 2 in Tulsa, OK, and become an essential part of our dynamic team dedicated to guarding global customers against cyber threats. This hybrid role is designed for those ready to tackle shift work, particularly from Wednesday to Saturday, from noon to 11 PM Central time. As a SOC Analyst Level 2, you'll dive into the thrilling world of IT security, where your contributions will significantly impact our clients' security posture. Your main responsibilities will involve monitoring and analyzing security events, using SIEM software, and identifying real threats versus false alarms. You'll initiate tickets and serve as a mentor for junior analysts, guiding them through intricate security challenges. Effective communication with customer IT teams will be crucial, as you'll help them remediate issues swiftly and maintain uninterrupted business operations. Staying abreast of the ever-changing threat landscape and tuning recommendations for security tools will also be key elements of your role. With a strong background in network protocols, event log analysis, and systems like Windows and Unix, you will thrive in the high-pressure environment of cybersecurity. Join us in safeguarding organizations and making a real difference in the world of digital defense!

Frequently Asked Questions (FAQs) for SOC Analyst Level 2 Role at BlueVoyant
What are the primary responsibilities of a SOC Analyst Level 2 at BlueVoyant?

As a SOC Analyst Level 2 at BlueVoyant, your primary responsibilities include monitoring and analyzing security events from various sources, using SIEM software, and differentiating between true threats and false positives. You will initiate incident tickets, escalate issues to higher-level analysts when necessary, and mentor junior team members, making sure that our clients' IT security is robust and adaptive to the current threat landscape.

Join Rise to see the full answer
What qualifications are needed for the SOC Analyst Level 2 position at BlueVoyant?

To be considered for the SOC Analyst Level 2 position at BlueVoyant, you would benefit from having excellent teamwork skills, substantial knowledge of intrusion detection/prevention systems and SIEM software, and a strong grasp of network protocols. Additionally, 1-4 years of hands-on SOC experience and relevant certifications, such as GCIA or GCIH, are preferred for this role.

Join Rise to see the full answer
What tools and technologies should SOC Analyst Level 2 candidates be familiar with at BlueVoyant?

Candidates for the SOC Analyst Level 2 role at BlueVoyant should have experience with several tools, including SIEM systems, intrusion detection systems (IDS), and network monitoring tools. Familiarity with software such as Wireshark, Splunk, and Security Onion is beneficial, as well as an understanding of packet analysis and malware detection techniques. The ability to work with programming/scripting languages is a plus!

Join Rise to see the full answer
What is the work schedule for a SOC Analyst Level 2 at BlueVoyant?

The work schedule for a SOC Analyst Level 2 at BlueVoyant involves a shift from Wednesday to Saturday, from 12 PM to 11 PM Central time. This structure allows for intense focus during high-volume periods, and as a part of a 24/7/365 team, you might also be required to work nights and weekends on a rotating basis.

Join Rise to see the full answer
Why is U.S. citizenship required for the SOC Analyst Level 2 position at BlueVoyant?

U.S. citizenship is required for the SOC Analyst Level 2 position at BlueVoyant due to contractual obligations related to federal contracts. This ensures that all team members can fulfill the necessary security clearance requirements to effectively perform their duties in protecting sensitive information.

Join Rise to see the full answer
Common Interview Questions for SOC Analyst Level 2
Can you describe your experience with intrusion detection/prevention systems?

When answering this question, highlight specific systems you've worked with, how you monitored alerts, and any hands-on experience you have in responding to threats. Detailing a particular instance where you identified a potential intrusion will showcase your analytical skills and depth of experience.

Join Rise to see the full answer
How do you prioritize security alerts and incidents?

Begin with an overview of your strategy for triage, focusing on the importance of assessing incidents based on severity and potential impact. Discuss any frameworks you use or metrics you consider when prioritizing alerts, illustrating your decision-making process with a relevant example.

Join Rise to see the full answer
What programming or scripting languages are you proficient in?

Mention specific languages you work with, such as Python, PowerShell, or Bash, and explain how you've applied these skills to automate tasks or analyze data within security operations. Concrete examples of your coding achievements will strengthen your answer.

Join Rise to see the full answer
Describe a challenging security incident you managed.

Construct a narrative around a real-life scenario where you dealt with a challenging security incident. Explain the nature of the threat, your analytical process, the steps you took to resolve it, and the outcome. Emphasizing your problem-solving skills will be key here.

Join Rise to see the full answer
How do you stay updated on the latest cybersecurity threats?

Discuss your habits of following industry blogs, participating in forums, or subscribing to threat intelligence platforms. Mention any conferences you attend and how you leverage this knowledge to inform your team and improve security measures.

Join Rise to see the full answer
What is your experience with SIEM tools like Splunk?

In your response, highlight your experience navigating SIEM tools, detailing specific functionalities you’ve used, such as creating alerts, dashboards, or reports. Discuss scenarios where these tools aided in your incident response and monitoring activities.

Join Rise to see the full answer
Can you explain the importance of log analysis in your role?

Explain how log analysis plays a crucial role in identifying and investigating security threats. Share methods you use for analyzing logs, and offer examples of findings that have led to significant incidents being addressed before escalation.

Join Rise to see the full answer
How do you mentor junior analysts in the SOC?

Provide examples of how you've guided junior analysts through complex cases, developed training sessions, or shared resources. This demonstrates your leadership and communication skills, which are valuable in a collaborative environment.

Join Rise to see the full answer
What do you understand about the cybersecurity threat landscape today?

Share insights into recent trends you've observed, including common attack vectors and types of malware. Highlight any specific threats you have come across and how these should inform security practices within the organization.

Join Rise to see the full answer
Why do you want to work for BlueVoyant as a SOC Analyst Level 2?

Research the company's mission, values, and recent achievements. Articulate how these align with your career goals, and express enthusiasm for contributing to their cybersecurity efforts and collaborating with a globally recognized team of experts.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Posted 12 days ago
Photo of the Rise User
Posted 11 days ago
Photo of the Rise User
Posted 14 days ago
Mission Driven
Inclusive & Diverse
Take Risks
Collaboration over Competition
Growth & Learning
Wyetech Hybrid Annapolis Junction, Maryland
Posted 10 days ago
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
EMPLOYMENT TYPE
Full-time, hybrid
DATE POSTED
December 17, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!