SonicJobs Logo
Login
Left arrow iconBack to search

Soc Analyst - Tier 1

Henderson Scott
Posted a day ago, valid for a month
Location

Erskine, Renfrewshire PA8 6BS, Scotland

Salary

£45,000 per annum

Contract type

Full Time

In order to submit this application, a TotalJobs account will be created for you. As such, in addition to applying for this job, you will be signed up to all TotalJobs’ services as part of the process. By submitting this application, you agree to TotalJobs’ Terms and Conditions and acknowledge that your personal data will be transferred to TotalJobs and processed by them in accordance with their Privacy Policy.

Sonic Summary

info
  • The position is for a Cyber Security Analyst (SOC) requiring 1-3 years of experience and current SC or DV security clearance.
  • The role involves monitoring and analyzing security events, incident response, and ticket management in a 24/7 shift pattern of 4 days on and 4 days off.
  • Candidates will work under senior analysts and utilize SIEM solutions and Kusto Query Language (KQL) for log analysis.
  • The salary is competitive, with a 30% shift allowance and excellent benefits included.
  • This role is ideal for individuals passionate about cybersecurity and looking to develop their skills in a dynamic SOC environment.

Cyber Security Analyst (SOC)
Shift Pattern - 24/7 coverage 4 days on 4 days off
Competitive salary with a 30% shift allowance and excellent benefits.

Candidates require current SC or DV security clearance.

Our client is looking to add talented Cyber Security Analyst (Tier 1) to support our Cyber Threat Analysis Centre (CTAC). This role is crucial in triaging, monitoring, and reporting potential cyber threats. Working under senior analysts, the Tier 1 Analyst will utilise SIEM solutions and Kusto Query Language (KQL) for log analysis, while managing incidents via multiple ticketing systems to meet service level objectives.

Key Responsibilities:

  • Monitor & Analyse: Review security events 24/7/365, detect threats, and escalate incidents.
  • Incident Response: Act as the first line of defence, validating and classifying threats.
  • Ticket Management: Document and track incidents for seamless shift handovers.
  • Collaboration: Work closely with senior analysts for complex investigations and service updates.
  • Process Improvement: Follow and refine workflows for enhanced efficiency.
  • Technical Development: Gain expertise in security event analysis across network traffic, host logs, and other data sources.
  • Leadership (when required): Lead shifts in the absence of a Tier 2 Analyst.


Skills & Experience:

  • Understanding of networking concepts, IP addressing, and basic network protocols.
  • Basic knowledge of Windows & Linux environments.
  • Competence in SIEM monitoring, KQL queries, and XDR platforms.
  • Familiarity with OSINT techniques for threat intelligence.
  • Strong communication skills for clear reporting and stakeholder engagement.


If you're passionate about cybersecurity and eager to develop in a dynamic SOC environment, apply today!

Apply now in a few quick clicks

In order to submit this application, a TotalJobs account will be created for you. As such, in addition to applying for this job, you will be signed up to all TotalJobs’ services as part of the process. By submitting this application, you agree to TotalJobs’ Terms and Conditions and acknowledge that your personal data will be transferred to TotalJobs and processed by them in accordance with their Privacy Policy.