×
Register Here to Apply for Jobs or Post Jobs. X

SOC Security Analyst L3

Job in College Park, Prince George's County, Maryland, 20741, USA
Listing for: BlueVoyant
Part Time position
Listed on 2026-03-12
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager, Network Security
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below

SOC Security Analyst L3

Location: Hybrid in College Park, Maryland (1-2 days per week in office)

Shift Requirement

Blue Voyant's U.S. Commercial SOC operates on a four days on, three days off schedule.

  • Wednesdays to Saturday or Tuesday to Friday: operating either
    • 8am - 6pm
    • 10am - 8pm
US Citizenship Required

U.S. citizenship is required.

Summary

Blue Voyant is looking for Security Operations Center (SOC) Analysts to defend our global customers from the constant fight against adversaries. You will be part of a fast‑paced team that helps spot, defend, and remediate adversary activity to reduce the impact and dwell time of security incidents.

As a Senior analyst, you are the ultimate technical expert and escalation point for analysts on your team. Your significant expertise in modern attacks, analysis of intrusion data, and knowledge of attack remediation ensures that attacks against our clients are handled with urgency, accuracy, and effective communication. You are the mentor for junior analysts, the trusted voice of customers, and the bane of adversaries.

The experience you bring to the role provides a front‑row voice to technology strategy, process improvements, and an advocate for analysts around the world.

Key Responsibilities
  • Monitor and analyze security events and alerts from multiple sources, including SIEM logs, endpoint logs, and EDR telemetry
  • Research indicators and activities to determine reputation and suspicious attributes
  • Perform analysis of malware, attacker network infrastructure, and forensic artifacts
  • Execute complex investigations and handle incident declaration
  • Perform live response analysis of compromised endpoints
  • Hunt for suspicious activity based on anomalous activity and curated intelligence
  • Participate in the response, investigation, and resolution of security incidents
  • Provide incident investigation, handling, response, and incident documentation
  • Engage and assist the Blue Voyant Incident Response teams for active intrusions
  • Ensure events are properly identified, analyzed, and escalated to incidents
  • Assist in the advancement of security policies, procedures, and automation
  • Serve as the technical escalation point and mentor for lower‑level analysts
  • Regularly communicate with clients to inform them of incidents and aid in remediation
  • Identification and tuning of false‑positive or benign detections
  • Perform peer review and QA of junior analyst investigations
  • Support Customer Success team with client engagements when required
Basic Qualifications People Skills
  • Ability to handle high pressure situations in a productive and professional manner
  • Ability to work directly with customers to understand requirements for and feedback on security services
  • Advanced written and verbal communication skills and the ability to present complex technical topics in clear and easy‑to‑understand language
  • Strong teamwork and interpersonal skills, including the ability to work effectively with a globally distributed team
  • Able and willing to work in a 24/7/365 environment, including nights and weekends, on a rotating shift schedule
Tech Skills
  • Knowledge and experience with SIEM solutions, Cloud App Security tools, and EDR
  • Advanced knowledge and understanding of network protocols and network telemetry
  • Forensic artifact and analysis knowledge of Windows and Unix systems
  • Expertise in Endpoint, Web, and Authentication log analysis
  • Experience with SIEM/EDR detection creation
  • Experience in responding to modern authentication attacks against AD, Entra, OATH, etc.
  • Expert knowledge of common attack paths, including LOLbin use, common adversary tools, business email compromises, AiTM attacks, including identification and response
Strong Knowledge of the following
  • SIEM workflows (preferably Sentinel and Splunk)
  • Modern authentication systems and attacks (SSO, OATH, Entra, etc.)
  • Malware Detection, to include dynamic and light static analysis
  • Network Monitoring metadata (web logs, firewall logs, WAF/IDS)
  • Email Security and common business email compromise attacks
  • Windows and Unix forensic artifacts (i.e. registry analysis, wtmp/btmp)
  • Windows PE and Maldoc analysis
  • Remote access solutions (both legitimate and inherently malicious)
  • Lateral movement…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary