IT Job Pro

SOC Analyst – Lv3

Viewed 0 times

Job Description

Our client, a prominent utility company within the technology sector, is currently seeking a Level 3 SOC Analyst to join their Information Systems directorate, based out of their Crawley office. This is a permanent position reporting to the Cyber Security Operations Manager. The role offers an excellent blend of in-office and remote working options post-probationary period.

Key Responsibilities:

Advanced Threat Hunting: Analyse and assess multiple threat intelligence sources and indicators of compromise to identify new threat patterns, vulnerabilities, and anomalies, and eradicate hidden threats.
Policy Development: Develop and create SOC policies and technical standards using industry best practices.
Log Management: Manage log sources within the SIEM solution and create alert use cases to identify patterns of anomalous activity.
Incident Response: Lead the response to high-severity security incidents, providing senior-level response activities and ensuring effective remediation and recovery actions.
Security Orchestration, Automation, and Response (SOAR): Support and develop the SOAR platform, creating new workflows for automated responses to common attack types.
Digital Forensics: Conduct forensic analysis on serious security incidents using data from multiple sources to ensure threats are contained and eradicated effectively.
Cyber Crisis Scenario Testing: Participate in cyber-attack simulation exercises to test and improve the organisation's cyber defences and resilience.
Reporting: Enhance security operations reporting capabilities and develop important security and performance metrics.

Job Requirements:

Extensive experience in a SOC Level 2 or 3 role with evidence of advanced threat hunting and incident response.
Experience in log correlation, forensics investigations, and compliance with regulatory frameworks.
Proficiency in security technologies including SIEM, SOAR, EDR, IDS/IPS, and behavioural analytics.
Knowledge of adversarial tactics, techniques, and industry-standard frameworks like Mitre ATT&CK.
Deep understanding of SIEM and SOAR solutions, Identity and Access Management, and Data Loss Prevention technologies.
Experience in developing incident response playbooks, SOAR, and conducting red-team exercises.
If you are an experienced SOC Analyst seeking a new challenge within a supportive and dynamic team, we would love to hear from you. Apply now to join our client's dedicated cyber security team in Crawley or Ipswich

Job Summary

Crawley, West Sussex Location
IT Job Pro

Similar Jobs

The largest community on the web to find and list jobs that aren't restricted by commutes or a specific location.