BlueAngle (BA) is a next-generation Business and Managed Services Provider (MSP) delivering comprehensive digital technology, infrastructure, and IT advisory solutions. In addition, we offer specialized cybersecurity services through our 24/7 Security Operations Center (SOC), designed to monitor, detect, and respond to threats across complex client environments.
Our SOC is staffed by experienced security analysts and engineers who leverage advanced security tools to provide continuous threat visibility and rapid response. We offer full-spectrum protection across endpoints, servers, cloud platforms, networks, and identities, ensuring every critical layer of our clients' IT ecosystems is covered.
At the core of BlueAngle’s mission is a commitment to strengthening our clients’ security posture through proactive threat management and incident response—aligned with global standards such as ISO/IEC 27001 and GDPR.
About the Role
BlueAngle is looking for a SOC Analysts Tier 2 for our afternoon shift (3:00 PM – 12:00 AM EST).
As a Tier 2 SOC Analyst, you will provide customer facing support in our 7x24x365 Security Operations Center (SOC). This position is contract to hire with full-time expectations (40 hours). The SOC Team manages and responds to alerts, notifications and client communications to review security related events, leading the incident response procedures through completion. As the client’s primary contact during security-related events, tracking and providing communication throughout the process is a critical role. The SOC Team ensures all reporting is accurate, documented and archived appropriately. The SOC Team strictly follows established SOP’s, policies and procedures for escalation, forensics and resolution.
Key Responsibilities:
- Continuously monitor the Help Desk and alerts from SIEM, EDR, Identity Protection, Network monitoring and other tools
- Provide escalation for Tier 1 SOC Analysts; provide clients an escalation resource
- Analyze security events and communicate with clients to determine validity of compromise
- Own the client communication during and after the event alert
- Review system logs and user actions to determine the scope of the incident
- Document and communicate findings in clear and concise language for IT and Executive audiences
- Provide security awareness of recurring attack patterns to internal teams and clients
- Collaborate with internal resources to refine detection rules and improve incident response
- Review trends in the MITRE ATT&CK adversary tactics for industry specific targeting
- Provide feedback to improve SOC playbooks, detection rules and automations
- Collaborate with cross-functional teams to improve security posture
- Work with BlueAngle leadership to provide enhancements to the SOC offering.
Qualifications and Experience:
- Bachelor’s degree in computer science, Information Systems or related field; relevant experience may be substituted for degree when appropriate
- Minimum 4 years experience in a SOC or related cybersecurity role
- Experience with Microsoft Intune and Sentinel, Crowdstrike, Cloudflare and other SOC tools
- Comprehension of security concepts and forensic analysis, including identity security, network security, Email analysis and intrusion detection
- Experience with security tools such as Endpoint Detection & Response (EDR/XDR), Identity Threat Protection (IDP), Phishing testing and training platforms, and penetration/vulnerability tools
- Exemplary communication skills; ability to present findings to a technical and non-technical audience
- Detail oriented with strong analytical and problem-solving skills
- Knowledge of cyber threat frameworks
- Experience in Ethical Hacking, Incident Response Planning and Incident Response
- Ability to work independently and take ownership of all job assignments
- Relevant certifications such as CISSP, Certified Ethical Hacker, CompTIA Security+, CySA+, Certified SOC Analyst, GIAC Security Essentials, Microsoft Security Operations Analyst Associate or other security related certifications.
Job Types: Full-time, Contract
Pay: $50,000.00 - $70,000.00 per year
Benefits:
- Flexible schedule
- Health insurance
- Paid time off
Compensation Package:
- Bonus opportunities
- Yearly pay
Schedule:
People with a criminal record are encouraged to apply
Application Question(s):
- Have you worked for at least 4 years as a SOC Technician Tier 2 with MSP(s)
- List the MSP(s) where you have worked for at least 4 years as a SOC Analyst Tier 2
Location:
Willingness to travel:
Work Location: Remote