Full-Time

SOC Security Analyst 3

Security Operations Center

Posted on 9/22/2025

BlueVoyant

BlueVoyant

501-1,000 employees

Cloud-native cyber defense with threat monitoring

No salary listed

Cork, Ireland

In Person

Night shifts are fully remote and last for four months each year.

Category
IT & Security (1)
Required Skills
Linux/Unix
Requirements
  • Ability to handle high pressure situations in a productive and professional manner.
  • Ability to work directly with customers to understand requirements for and feedback on security services
  • Advanced written and verbal communication skills and the ability to present complex technical topics in clear and easy-to-understand language
  • Strong teamwork and interpersonal skills, including the ability to work effectively with a globally distributed team
  • Able and willing to work in a 24/7/365 environment, including nights and weekends, on a rotating shift schedule
  • Knowledge and experience with SIEM solutions, Cloud App Security tools, and EDR
  • Advanced knowledge and understanding of network protocols and network telemetry
  • Forensic artifact and analysis knowledge of Windows and Unix systems
  • Expertise in Endpoint, Web, and Authentication log analysis
  • Experience with SIEM/EDR detection creation
  • Experience in responding to modern authentication attacks against AD, Entra, OATH, etc.
  • Expert knowledge of common attack paths, including LOLbin use, common adversary tools, business email compromises, AiTM attacks, including identification and response
  • Strong knowledge of SIEM workflows (preferably Sentinel and Splunk)
  • Strong knowledge of modern authentication systems and attacks SSO, OATH, Entra, etc.
  • Strong knowledge of Malware Detection, to include dynamic and light static analysis
  • Strong knowledge of Network Monitoring metadata (web logs, firewall logs, WAF/IDS)
  • Strong knowledge of Email Security and common business email compromise attacks
  • Strong knowledge of Windows and Unix forensic artifacts (i.e., registry analysis, wtmp/btmp)
  • Strong knowledge of Windows PE and Maldoc analysis
  • Strong knowledge of Remote access solutions (both legitimate and inherently malicious)
  • Strong knowledge of Lateral movement methodologies and tools for Windows & Unix-based Oses
  • Strong knowledge of O365 attack paths, common attacker methodologies, and analysis
  • Strong knowledge of Network metadata analysis and knowledge of commonly abused protocols
  • Expert knowledge of credential harvesting tools and methodologies
Responsibilities
  • Monitor and analyze security events and alerts from multiple sources, including SIEM logs, endpoint logs, and EDR telemetry
  • Research indicators and activities to determine reputation and suspicious attributes
  • Perform analysis of malware, attacker network infrastructure, and forensic artifacts
  • Execute complex investigations and handle incident declaration
  • Perform live response analysis of compromised endpoints
  • Hunt for suspicious activity based on anomalous activity and curated intelligence
  • Participate in the response, investigation, and resolution of security incidents
  • Provide incident investigation, handling, response, and incident documentation
  • Engage and assist the BlueVoyant Incident Response teams for active intrusions
  • Ensure events are properly identified, analyzed, and escalated to incidents
  • Assist in the advancement of security policies, procedures, and automation
  • Serve as the technical escalation point and mentor for lower-level analysts
  • Regularly communicate with clients to inform them of incidents and aid in remediation
  • Identification and tuning of false-positive or benign detections
  • Perform peer review and QA of junior analyst investigations
  • Support Customer Success team with client engagements when required
Desired Qualifications
  • Experience intrusion analysis / incident response, digital forensics, penetration testing, or related areas
  • 5+ years of hands-on SOC/TOC/NOC experience
  • GIAC certification(s) strongly preferred. CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred
  • Familiarity with technologies such as Sentinel, Splunk, Microsoft Defender suites, Crowdstrike Falcon, SentinelOne
  • Familiarity with GPO, Landesk, or other IT Infrastructure tools
  • Understanding and/or experience with one or more of the following programming languages: JavaScript, Python, Lua, Ruby, GoLang, Rust

BlueVoyant provides cyber defense solutions via a cloud-native platform that combines internal and external security operations to protect networks, endpoints, and the digital attack surface. It continuously monitors environments and uses threat detection and analytics to give real-time visibility. A major focus is supply chain security, using machine-learning automation and human expertise to identify, validate, and mitigate threats across complex third-party networks by monitoring domains, websites, social media, and applications. It also offers specialized Microsoft Security tools services and serves commercial and government clients, aiming to reduce digital risk and enable proactive defense across on-premises and cloud environments.

Company Size

501-1,000

Company Stage

Series E

Total Funding

$695.5M

Headquarters

New York City, New York

Founded

2017

Simplify Jobs

Simplify's Take

What believers are saying

  • John Hernandez's CEO appointment scales AI platform globally using Quest and Genesys experience.
  • Philippines SOC launched April 2026 cuts APJ time-zone delays, boosting regional demand capture.
  • VISIBL mROC with Qualys enables proactive risk management, consolidating customer tools.

What critics are saying

  • Cork SOC scales from 9 to 15 employees, causing analyst burnout and service degradation by November 2026.
  • Qualys VISIBL partnership lets Qualys siphon clients with competing TPRM tools by May 2028.
  • Philippines SOC faces South China Sea shutdown, crippling global operations by May 2029.

What makes BlueVoyant unique

  • BlueVoyant integrates AI-driven internal, external, and supply chain cyber defense in one platform.
  • Portfolio Cyber Defense de-risks investments for organizations over 600 employees using Microsoft and Splunk MDR.
  • COMS optimizes Microsoft Security tools, leveraging 2024 Microsoft Worldwide Security Partner award.

Help us improve and share your feedback! Did you find this helpful?

Benefits

Flexible Work Hours

Remote Work Options

Growth & Insights and Company News

Headcount

6 month growth

0%

1 year growth

1%

2 year growth

1%
BlueVoyant
Nov 24th, 2025
Top Security Insights You Need to Know from Microsoft Ignite 2025

Sophia lagerkrans-pandey and micah heaton. A practical guide for security leaders with BlueVoyant's perspective from the ground at Ignite. Microsoft Ignite 2025 delivered big news for security professionals. The theme this year is clear: Microsoft is giving customers more capability inside the tools they already own, focused on AI agents and integrations. Whether you are a small IT team, a mid-market group, or a global enterprise, these updates can transform your security posture. BlueVoyant was on the ground at Ignite, and BlueVoyant International is here to break down the top five security insights plus a bonus and share practical steps to help you activate these innovations. 1. Security Copilot Entitlement Arrives for Microsoft 365 E5 Customers Security Copilot is now included in Microsoft 365 E5. Rollout begins in 2025, giving customers a meaningful block of Security Compute Units (SCUs) without extra licensing. This means AI-powered investigation, response, and automation are now accessible to organizations of every size. You do not need a large SOC to realize value. You only need a clear adoption plan and guided workflows. Why it matters: Copilot will redefine how teams respond to threats, automate workflows, and close the expertise gap. But success depends on more than entitlement; it requires a clear vision for adoption. 2. Microsoft Defender capabilities include proactive mid-attack action Microsoft Defender is introducing several features, strengthening its ability to detect and thwart attacks. First is Predictive Shielding, a component of automatic attack disruption, that can anticipate attacker movement and apply just-in-time hardening actions to critical assets, reducing thousands of potential attack paths to just a handful, optimizing business continuity while minimizing risk. Microsoft is also extending automatic attack disruption beyond Defender to AWS, Proofpoint, and Okta via Sentinel signals. This will enable real-time detection and containment of threats like phishing and identity compromise across federated accounts and cloud boundaries. They also announced a Threat-Hunting Agent that will orchestrate full threat-hunting sessions through natural language and receive summarized answers, underlying KQL queries and dynamic follow-up suggestions all within a chat interface. The agent will also provide contextual insights and visualizations like timelines, making advanced hunting accessible even to those without query expertise. Why it matters: SOC teams receive incidents at a scale that isn't maintainable. Predictive capabilities reduce manual effort and accelerate containment, especially for hybrid and multi-cloud environments. This update will allow SOC teams to focus on high priority incidents. 3. Security Copilot and Security Store Expand Agent-Powered Security Microsoft expanded the Security Store and introduced 12 new built-in agents across Defender, Entra, Intune, and Purview. The Security Store now offers 100+ solutions, including partner agents and service offerings. BlueVoyant's own Security Copilot agents were featured at Ignite, including the Watchtower Agent, which helps SOC teams maintain visibility and optimize Microsoft Security tools through automated health checks, variance analysis, and actionable recommendations. Why it matters: Agents will become the backbone of automated triage and investigation. Governance and safe adoption are critical to avoid complexity and risk. Selecting and deploying the right Security Copilot agents is not just a technical decision; it is a strategic move that shapes how your organization leverages AI in security operations. BlueVoyant helps you cut through the noise by identifying which agents align with your business objectives and risk posture. Its team ensures these agents are deployed and governed effectively, while building automated triage and investigation workflows that accelerate response and reduce analyst fatigue. BlueVoyant International also map agent usage to your Security Copilot SCU entitlements to maximize ROI and provide expert guidance on safe, responsible adoption practices. This approach empowers your SOC to move beyond reactive security and embrace a proactive, AI-driven model. 4. Microsoft Sentinel Becomes an AI-Ready Security Platform Sentinel now includes a modern data lake, graph capabilities, and an MCP server, enabling richer analytics and improved entity understanding. Sentinel is evolving from a traditional SIEM to an intelligence layer for teams of all sizes that support richer analytics and entity understanding. Why it matters: Sentinel is no longer just about log aggregation; it is the foundation for AI-driven detection and response. 5. Unified Security Cloud Posture Across Azure, AWS, and Google Cloud Defender for Cloud and Sentinel now provides unified posture management across Azure, AWS, and GCP. This gives customers a single view of configuration drift, exposure, vulnerabilities, and attack paths. Why it matters: Fragmented visibility is one of the biggest challenges in cloud security. Unified posture management simplifies governance and accelerates remediation. Small teams no longer need multiple consoles. Larger teams gain consolidated posture visibility across cloud boundaries. Bonus Insight: Microsoft Purview Adds AI-Driven Data Security and Governance Purview now offers AI-powered DSPM, agent governance controls, stronger DLP for Copilot prompts, and two new Security Copilot agents for data security. These updates unify data security, compliance, and AI safety. Why it matters: Data security is becoming inseparable from AI governance. Organizations need a holistic approach to protect sensitive information in an AI-driven world. The future of productivity is AI-powered. Make sure your data security strategy is too. Start with BlueVoyant's Data Security Diagnostic

Business Wire
Oct 1st, 2025
BlueVoyant Partners with Axio to Modernize Cybersecurity Vendor Selection

BlueVoyant partners with Axio to modernize cybersecurity vendor selection.

PR Newswire
Sep 23rd, 2025
BlueVoyant Launches VISIBL mROC Service to Power Proactive Cyber Risk Management with Qualys

BlueVoyant launches VISIBL mROC Service to power proactive cyber risk management with Qualys.

Cybersecurity News Central
May 8th, 2025
BlueVoyant Unveils New Enterprise Cybersecurity Solution to Strengthen Cyber Defense and Manage Costs

BlueVoyant unveils new enterprise cybersecurity solution to strengthen cyber defense and manage costs.

NextTech Today
May 7th, 2025
BlueVoyant Launches COMS for Microsoft Security

BlueVoyant, the leader in integrated cybersecurity, today launched its Continuous Optimization for Microsoft Security (COMS) offering.

INACTIVE