Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
SOC Team Lead image - Rise Careers
Job details

SOC Team Lead

SOC Team LeadThis position is ideally located in College Park, Maryland. Remote US candidates may be considered.US Citizenship required for this role.The schedule will be a Panama schedule: (slow rotating shift pattern that uses 4 teams and two 12-hour shifts to provide 24/7 coverage. The working and non-working days follow this pattern: 2 days on, 2 days off, 3 days on, 2 days off, 2 days on, 3 days off)BlueVoyant is looking for Security Operations Center (SOC) Team Lead to help our global customers manage their IT security. You will be part of a fast-paced team that helps customers to reduce the impact of security incidents and ensures that critical business operations continue unhindered.BlueVoyant SOC Team Leads are the first line leaders tasked with enabling efficient, world-class teams to defend clients from adversaries. As a technical expert and defensive strategist, you’ll be instrumental in guiding analysts through active intrusions, aiding clients in taking action, and building a culture of client-first detection and response.Key ResponsibilitiesAs a team lead the success of the team relies on your expertise to spot and respond to attacks before adversaries gain a foothold. Your visibility over incoming alerts allows you to spot trends, prioritize analysis work, and define the gold standard of analyst work.As a Team Lead, you’ll directly supervise analysts on your shift, providing mentorship, workflow assistance, quality and performance reviews, and provide excellent customer service.Supervise and mentor Security Analysts during a standard working team/shiftManage analyst workload and workflows while acting as an escalation point for your teamCommunicate with BlueVoyant clients throughout incident escalations and lifecycleSupervise operations in deterring, identifying, monitoring, investigating, and analyzing attacksSupport analyst alert triage to identify whether appropriate escalations occurred, and monitor for patterns indicating late-stage incident lifecycle alerts requiring incident responseProvide quality control and feedback for analyst investigationsParticipate in the response, investigation, and resolution of security incidentsEnsure teams are aware of operating procedures and any changes or additionsAid in keeping operational documentation up to dateProvide incident investigation, handling, and response, including incident documentationServe as the technical escalation point and mentor for your analyst teamPerform triage of incoming issues (assess the priority, determine risk)Maintain a strong awareness of the current threat landscapeBasic QualificationsPeople Skills:Strong teamwork and interpersonal skills, including the ability to work effectively with a globally distributed teamAble and willing to work in a 24/7/365 environment, including nights and weekends, on a rotating shift scheduleExperience managing technical individual contributors, including providing feedback, monitoring quality, and prioritizing workStrong customer communications skills, including articulating complex or urgent technical data and scenarios to non-technical audiencesAbility to handle high pressure situations in a productive and professional manner.Tech Skills:Knowledge of and experience with intrusion detection/prevention systems and SIEM softwareAdvanced knowledge and understanding of network protocols and devices.Advanced experience with Mac OS, Windows, and Unix systems.Ability to analyze event logs and recognize signs of cyber intrusions/attacksAdvanced written and verbal communication skills and the ability to present complex technical topics in clear and easy-to-understand languageFamiliarity with tools such as Malware Sandboxes, Sentinel, Splunk, EDR solutionsStrong knowledge of the following:Enterprise Cloud Solutions (Azure, GCP, AWS)Modern authentication systems and attacks (SSO, OATH, Entra, etc.)SIEM workflows (preferably Sentinel and Splunk)Packet AnalysisMalware Detection, to include dynamic and light static analysisNetwork Monitoring metadata (web logs, firewall logs, WAF/IDS)Email Security and common business email compromise attacksVulnerability Identification and correlation to attacker behaviorPreferred QualificationsExperience in network/host vulnerability analysis, intrusion analysis, digital forensics, penetration testing, or related areas5+ years of hands-on SOC/TOC/NOC experienceGCIA and/or GCIH required. GCFA, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferredFamiliarity with technologies such as Sentinel, Splunk, Microsoft Defender suites, Crowdstrike Falcon, SentinelOneFamiliarity with Group Policy, Intune, Virtualization, and other IT Infrastructure toolsUnderstanding and/or experience with one or more of the following programming languages: JavaScript, Python, Lua, Ruby, GoLang, RustEducationMinimum bachelor’s degree in Information Security, Computer Science, or other IT-related field or equivalent experienceAbout BlueVoyantAt BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics, and technology, coupled with deep expertise, works as a force multiplier to secure your full ecosystem. Accuracy! Actionability! Timeliness! Scalability!Led by CEO, Jim Rosenthal, BlueVoyant’s highly skilled team includes former government cyber officials with extensive frontline experience in responding to advanced cyber threats on behalf of the National Security Agency, Federal Bureau of Investigation, Unit 8200, and GCHQ, together with private sector experts. BlueVoyant services utilize large real-time datasets with industry leading analytics and technologies.Founded in 2017 by Fortune 500 executives, including Executive Chairman, Tom Glocer, and former Government cyber officials, BlueVoyant is headquartered in New York City and has offices in Maryland, Tel Aviv, San Francisco, London, Budapest, and Latin America.All employees must be authorized to work in the United States. BlueVoyant provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, BlueVoyant complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.Disclaimer: Please note that pursuant to contractual requirements and applicable law, in order for employees to perform work on some of the company’s federal contracts, U.S. citizenship is required. Accordingly, an employee’s ability to perform work on such contracts is contingent upon the company’s verification of the employee’s citizenship status. Furthermore, individuals may be subject to additional background checks and fingerprinting.BlueVoyant Candidate Privacy NoticeTo understand how we secure and manage your personal data upon submitting a job application, please see our Candidate Privacy Notice, which can be found here - Candidate Privacy NoticePowered by JazzHROriginal job SOC Team Lead posted on GrabJobs ©. To flag any issues with this job please use the Report Job button on GrabJobs.
BlueVoyant Glassdoor Company Review
3.9 Glassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon Glassdoor star icon
BlueVoyant DE&I Review
4.1 Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon
CEO of BlueVoyant
BlueVoyant CEO photo
Unknown name
Approve of CEO
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
EMPLOYMENT TYPE
Full-time, remote
DATE POSTED
August 29, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
Other jobs
Company
Posted 4 months ago
Company
Tanium Hybrid Emeryville, CA (Hybrid)
Posted 3 months ago
Company
Posted last month
Company
Posted 2 years ago