About The Position

Blackpoint Cyber is seeking a Cloud MDR Analyst with demonstrated experience in Security Operations and Cloud Security to join our Threat Operations Center. In this role, you will be a frontline defender of our clients' cloud environments — monitoring, investigating, and responding to threats targeting Microsoft 365, Google Workspace and Cisco Duo as part of our Cloud Response capability. You will work alongside seasoned MDR analysts in a 24×7×365 environment to detect and neutralize adversaries operating within SaaS and cloud-native attack surfaces before they can cause harm.

Requirements

  • Motivation and drive to work in a fast-paced and dynamic external SOC environment with a focus on cloud and SaaS security
  • Minimum of 1-2 years of experience in an information security role; progressive relevant training and/or certification may be substituted for one year of the experience requirement
  • Experience working in a SOC with cloud incident exposure preferred
  • Working knowledge of Microsoft 365 security features including Microsoft Defender for Office 365, Microsoft Defender for Identity, Microsoft Entra ID (Azure AD), Conditional Access Policies, and the Microsoft Unified Audit Log
  • Familiarity with Google Workspace security capabilities including Google Workspace Admin Console, Context-Aware Access, DLP policies, and Google Workspace Audit & Investigation Tool
  • Understanding of cloud identity attack vectors such as credential stuffing, MFA bypass techniques (AiTM, SIM-swapping), OAuth phishing, and token theft
  • Some knowledge of cloud-adjacent tradecraft including Living off the Land techniques applied to cloud environments, lateral movement via federated identity, and cloud persistence mechanisms
  • Excellent problem-solving skills, critical thinking, and analytical skills with the ability to deconstruct issues and hunt anomalous patterns in cloud telemetry
  • Excellent verbal and written communication skills to effectively summarize and present cloud incident findings to both technical and non-technical stakeholders
  • Ability to work independently or as a member of a team in a shift-based environment
  • Must be eligible for SkillBridge and able to work the Hybrid Shift (Mon - Fri 12 PM - 8 PM ET)
  • Must be an active member of the U.S. Military with 180 days of service or fewer remaining prior to your date of separation and have at least 180 continuous days of active service

Nice To Haves

  • Experience with CTF platforms or cloud security labs such as TryHackMe, PwnedLabs, or Microsoft Learn security paths are a plus

Responsibilities

  • Monitor and analyze anomalous behavior across Microsoft 365, Google Workspace and Cisco Duo environments, including suspicious sign-ins, OAuth application abuse, mailbox rule manipulation, data exfiltration indicators, and identity-based attacks
  • Follow standardized Cloud Response playbooks to triage, escalate, and respond to security events across SaaS platforms, including account containment, session revocation, and admin remediation actions
  • Investigate cloud-specific attack techniques such as Business Email Compromise (BEC), adversary-in-the-middle (AiTM) phishing, OAuth consent grant abuse, and privilege escalation via misconfigured cloud permissions
  • Collaborate with Senior Analysts to research and investigate emerging cloud threat tradecraft and contribute recommendations for new detection logic targeting M365 and Google Workspace telemetry
  • Proactively identify and mitigate false positives across cloud alert pipelines by working with senior analysts to suppress noisy or low-fidelity detections
  • Collaborate with customers to review cloud security incidents and assist with detection, prevention, and mitigation strategies — including guiding clients through Microsoft Secure Score improvements and Google Workspace security posture reviews
  • Leverage cloud-native audit logs — including Microsoft Unified Audit Log, Azure AD Sign-in Logs, and Google Workspace Admin Reports — to reconstruct attacker timelines and scope incidents
  • Bring your observant and curious mindset to cloud investigations and security events!

Benefits

  • Health Insurance
  • Vision Insurance
  • Dental Insurance
  • Life Insurance
  • 401k plan
  • Discretionary Time Off

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Intern

Education Level

No Education Listed

Number of Employees

11-50 employees

© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service