IT Job Pro

SOC Analyst – Lv3

Viewed 0 times

Job Description

Our client, a prominent utility company within the technology sector, is currently seeking a Level 3 SOC Analyst to join their Information Systems directorate, based out of their Crawley office. This is a permanent position reporting to the Cyber Security Operations Manager. The role offers an excellent blend of in-office and remote working options post-probationary period.

Key Responsibilities:

Advanced Threat Hunting: Analyse and assess multiple threat intelligence sources and indicators of compromise to identify new threat patterns, vulnerabilities, and anomalies, and eradicate hidden threats.
Policy Development: Develop and create SOC policies and technical standards using industry best practices.
Log Management: Manage log sources within the SIEM solution and create alert use cases to identify patterns of anomalous activity.
Incident Response: Lead the response to high-severity security incidents, providing senior-level response activities and ensuring effective remediation and recovery actions.
Security Orchestration, Automation, and Response (SOAR): Support and develop the SOAR platform, creating new workflows for automated responses to common attack types.
Digital Forensics: Conduct forensic analysis on serious security incidents using data from multiple sources to ensure threats are contained and eradicated effectively.
Cyber Crisis Scenario Testing: Participate in cyber-attack simulation exercises to test and improve the organisation's cyber defences and resilience.
Reporting: Enhance security operations reporting capabilities and develop important security and performance metrics.

Job Requirements:

Extensive experience in a SOC Level 2 or 3 role with evidence of advanced threat hunting and incident response.
Experience in log correlation, forensics investigations, and compliance with regulatory frameworks.
Proficiency in security technologies including SIEM, SOAR, EDR, IDS/IPS, and behavioural analytics.
Knowledge of adversarial tactics, techniques, and industry-standard frameworks like Mitre ATT&CK.
Deep understanding of SIEM and SOAR solutions, Identity and Access Management, and Data Loss Prevention technologies.
Experience in developing incident response playbooks, SOAR, and conducting red-team exercises.
If you are an experienced SOC Analyst seeking a new challenge within a supportive and dynamic team, we would love to hear from you. Apply now to join our client's dedicated cyber security team in Crawley or Ipswich

Job Summary

wave-1-bottom
Crawley, West Sussex Location
IT Job Pro

Similar Jobs

The largest community on the web to find and list jobs that aren't restricted by commutes or a specific location.