CareerZen Logo
Company logo

Security Operations Center (SOC) Analyst - Tier 2 (with SOC Certification)2

BlueAngle, LLC

Full-time | Contract

United States

Job description

BlueAngle (BA) is a next-generation Business and Managed Services Provider (MSP) delivering comprehensive digital technology, infrastructure, and IT advisory solutions. In addition, we offer specialized cybersecurity services through our 24/7 Security Operations Center (SOC), designed to monitor, detect, and respond to threats across complex client environments.

Our SOC is staffed by experienced security analysts and engineers who leverage advanced security tools to provide continuous threat visibility and rapid response. We offer full-spectrum protection across endpoints, servers, cloud platforms, networks, and identities, ensuring every critical layer of our clients' IT ecosystems is covered.

At the core of BlueAngle’s mission is a commitment to strengthening our clients’ security posture through proactive threat management and incident response—aligned with global standards such as ISO/IEC 27001 and GDPR.

About the Role

BlueAngle is looking for multiple SOC Analysts for our daytime (8:00 AM – 5:00 PM EST) and overnight (12:00 AM – 9:00 AM EST) shifts.

As a Tier 1 SOC Analyst, you will provide customer facing support in our 7x24x365 Security Operations Center (SOC). This position is contract to hire with full-time expectations (40 hours). The SOC Team manages and responds to alerts, notifications and client communications to review security related events, leading the incident response procedures through completion. As the client’s primary contact during security-related events, tracking and providing communication throughout the process is a critical role. The SOC Team ensures all reporting is accurate, documented and archived appropriately. The SOC Team strictly follows established SOP’s, policies and procedures for escalation, forensics and resolution.

Key Responsibilities:

  • Continuously monitor the Help Desk and alerts from SIEM, EDR, Identity Protection, Network monitoring and other tools
  • Analyze security events and communicate with clients to determine validity of compromise
  • Own the client communication during and after the event alert
  • Review system logs and user actions to determine the scope of the incident
  • Document and communicate findings in clear and concise language for IT and Executive audiences
  • Provide security awareness of recurring attack patterns to internal teams and clients
  • Collaborate with internal resources to refine detection rules and improve incident response
  • Review trends in the MITRE ATT&CK adversary tactics for industry specific targeting
  • Provide feedback to improve SOC playbooks, detection rules and automations
  • Collaborate with cross-functional teams to improve security posture
  • Work with BlueAngle leadership to provide enhancements to the SOC offerings.

Qualifications and Experience:

  • Minimum 2 years experience in a SOC or related cybersecurity role
  • Experience with Microsoft Intune and Sentinel, Crowdstrike, Cloudflare and other SOC tools
  • Comprehension of security concepts and forensic analysis, including identity security, network security, Email analysis and intrusion detection
  • Experience with security tools such as Endpoint Detection & Response (EDR/XDR), Identity Threat Protection (IDP), Phishing testing and training platforms, and penetration/vulnerability tools
  • Exemplary communication skills
  • Detail oriented with strong analytical and problem-solving skills
  • Knowledge of cyber threat frameworks
  • Collaborative mindset, and proactive approach
  • Relevant certifications such as CompTIA Security+, CySA+, Certified SOC Analyst, GIAC Security Essentials, Microsoft Security Operations Analyst Associate or other security related certifications

Job Types: Full-time, Contract

Pay: $50,000.00 - $70,000.00 per year

Benefits:

  • Flexible schedule
  • Health insurance
  • Paid time off

Compensation Package:

  • Bonus opportunities
  • Yearly pay

Schedule:

  • Day shift
  • Night shift

People with a criminal record are encouraged to apply

Application Question(s):

  • Please list your CompTIA Security+, CySA+, Certified SOC Analyst, GIAC Security Essentials, Microsoft Security Operations Analyst Associate or other security related certifications
  • Have you worked for at least two years in a SOC analyst role with MSPs?
  • Please list the MSP(s) where you have worked for at least one year in a SOC analyst role

Experience:

  • SOC Analyst role at MSPs: 2 years (Required)

Location:

  • United States (Required)

Willingness to travel:

  • 25% (Preferred)

Work Location: Remote