SOC Analyst (Senior and Lead)

SOC Analyst (Senior and Lead)

Posted Today by Addition

£53,697 Per year
Undetermined
Undetermined
Hanslope, Buckinghamshire

Summary: The Level 1 Cyber Security Operations Centre (SOC) Analyst role involves monitoring systems for cyber threats and responding to security incidents as part of a 24/7 team. The analyst will be responsible for incident triage, initial response, reporting, and tool management. This position requires strong problem-solving skills and effective communication in a team environment. A background in cyber security or related fields is preferred, along with experience in security tools like SPLUNK.

Key Responsibilities:

  • Continuous Monitoring: Monitor security tools, including SIEM systems, to detect suspicious activity.
  • Incident Triage: Analyze alerts and logs to determine if an event is a genuine security incident or a false positive.
  • Initial Incident Response: Perform initial containment actions for confirmed incidents and escalate to Level 2 or 3 analysts.
  • Reporting and Documentation: Create detailed tickets and reports for all detected incidents.
  • Tool Management: Assist in the maintenance and optimization of security tools.

Key Skills:

  • Excellent problem-solving abilities.
  • Strong attention to detail.
  • Capacity to work under pressure.
  • Strong written and verbal communication skills.
  • Experience with SPLUNK within a Security Operations Centre (SOC).
  • Bachelor’s degree in computer science, Cyber Security, Information Technology, or a related field preferred.
  • Foundational understanding of networking concepts, operating systems, and common cyber-attack techniques.
  • Certifications like CompTIA Security+, Cybersecurity Analyst (CySA+) are a bonus.

Salary (Rate): £53,697 yearly

City: Hanslope

Country: United Kingdom

Working Arrangements: undetermined

IR35 Status: undetermined

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:
Scope & Objectives We're looking for a highly motivated and detail-oriented Level 1 Cyber Security Operations Centre (SOC) Analyst to join our team. In this role, you will be on the front lines, helping to protect our organization from cyber threats. You will be a part of a 24/7 team responsible for monitoring our systems, detecting potential security incidents, and initiating the incident response process. Key Responsibilities Continuous Monitoring: You will monitor security tools, including Security Information and Event Management (SIEM) systems, to detect suspicious activity. You will be the first to see potential threats and will need to be efficient and professional response against defined processes. Incident Triage: You will analyse alerts and logs to determine if an event is a genuine security incident or a false positive. You will need to be methodical and follow established procedures to classify and prioritize incidents. Initial Incident Response: For confirmed incidents, you'll perform initial containment actions, such as isolating affected systems, and escalate the incident to a Level 2 or 3 analyst for deeper investigation. Reporting and Documentation: You'll create detailed tickets and reports for all detected incidents, documenting your findings and the steps you took. This is crucial for tracking incidents and for future analysis. Tool Management: You will assist in the maintenance and optimization of security tools, ensuring they are working correctly and effectively. Excellent problem-solving abilities, strong attention to detail, and the capacity to work under pressure. You should be a strong communicator, both written and verbal, and be comfortable working in a team environment. Experience of SPLUNK within a Security Operations Centre (SOC). Qualifications: Education: A bachelor’s degree in computer science, Cyber Security, Information Technology, or a related field is preferred. Relevant experience may be substituted for a degree. Knowledge: You should have a foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber-attack techniques. Certifications: While not required, certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus to the role.