Connecting...

W1siziisijiwmtgvmtivmtmvmdkvmjuvntavmziyl2ljdc5qcgcixsxbinailcj0ahvtyiisijiwmdb4nzawiyjdxq
Job

SOC Analyst

Job Role: SOC Analyst

Contract: 3 - 6 Months +

Location: UK Remote Working

Rate: £750 per day inside ir35

Security clearance at SC level is required for this role

I am recruiting a SOC Analyst for a client of mine who are an IT systems integrator operating within the UK defence and government sector. The SOC Analyst will help their Security Operations Centre (SOC) to deliver an efficient and effective service to a wide range of clients.

I am looking for a level 2 SOC Analyst (or an experienced Level 1 SOC Analyst ready to progress)

Key Responsibilities

  • Implement and manage security tools, Microsoft Sentinel & Lighthouse and Splunk
  • Monitor, triage, escalate and investigate security incidents on critical client infrastructure
  • Provide Incident Response support when required
  • Deliver client reports based on incident findings to both technical and non-technical audiences
  • Maintain and, where appropriate, improve and develop team knowledge of SOC tools and security operations and triage
  • Prepare Executive Summary Reports for managed clients and continuously improve their content and presentation.
  • Work as part of a team to ensure that corporate data and technology platform components are safeguarded from known threats

Essential Skills

  • Minimum of 18 months - 2 years' experience in Security Operations Centre
  • Demonstrable experience of deploying and Managing Microsoft Sentinel and Splunk implementations
  • Microsoft Lighthouse
  • Mitre attack framework and setting this up on associated application packages
  • Deep technical knowledge in the analysis of pcaps, log data and intrusion detection systems
  • Basic knowledge of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise Anti-Virus products
  • Strong understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP
  • After-hours availability for major incidents required

Desirable Skills

  • Understanding of static malware analysis and reverse engineering
  • Understanding of programming and scripting such as Python, Perl, Bash, PowerShell, C++
  • CREST Practitioner Intrusion Analyst
  • Experience with other SIEM technologies, namely QRadar and LogRhythm

If you are interested in this role or wish to apply please feel free to reply to this advert or call me on 01737 821029 or 07766 512829

Many thanks,