SonicJobs Logo
Login
Left arrow iconBack to search

Soc Analyst - Tier 2

Henderson Scott
Posted a day ago, valid for 16 days
Location

Farnborough, Hampshire GU14 0HS, England

Contract type

Full Time

In order to submit this application, a Reed account will be created for you. As such, in addition to applying for this job, you will be signed up to all Reed’s services as part of the process. By submitting this application, you agree to Reed’s Terms and Conditions and acknowledge that your personal data will be transferred to Reed and processed by them in accordance with their Privacy Policy.

Sonic Summary

info
  • The Cyber Security Analyst (SOC Tier 2) position offers a competitive salary with a 30% shift allowance and excellent benefits, requiring candidates to work on a 24/7 shift pattern of 4 days on and 4 days off.
  • The role is focused on advanced threat investigations, incident triaging, and mentoring Tier 1 Analysts within the Cyber Threat Analysis Centre (CTAC).
  • Candidates should have a strong understanding of networking concepts, advanced knowledge of Windows and Linux environments, and expertise in SIEM tools and Kusto Query Language (KQL).
  • This position emphasizes the importance of collaboration with Tier 3 Analysts for incident escalation and process improvement while enhancing detection rules and minimizing false positives.
  • A minimum of 3 years of experience in cybersecurity is preferred for applicants seeking to grow in threat detection and response.

Cyber Security Analyst (SOC Tier 2)Shift Pattern - 24/7 coverage 4 days on 4 days offCompetitive salary with a 30% shift allowance and excellent benefits. Our client is seeking Tier 2 Cyber Security Analyst to join their Cyber Threat Analysis Centre (CTAC). This role is vital in advancing threat investigations, triaging escalated incidents, and mentoring Tier 1 Analysts. The Tier 2 Analyst bridges foundational and advanced threat detection, ensuring efficient SOC operations.Key Responsibilities:

  • Advanced Threat Analysis: Investigate and triage escalated security incidents, determining severity and response actions.
  • SIEM & Log Analysis: Utilize Kusto Query Language (KQL) and SIEM platforms for event correlation and documentation.
  • Incident Escalation: Identify and escalate critical threats to Tier 3 Analysts for further action.
  • Threat Intelligence: Leverage OSINT techniques to enhance detection and improve situational awareness.
  • Detection & Response: Collaborate with Tier 3 Analysts to refine detection rules, tune SIEM tools, and minimize false positives.
  • Process Improvement: Contribute to refining incident response playbooks and detection workflows.
  • Mentorship & Training: Guide and support Tier 1 Analysts, enhancing their technical skills and efficiency.

Skills & Experience:

  • Strong understanding of networking concepts, IP protocols, and traffic analysis.
  • Advanced knowledge of Windows & Linux environments.
  • Expertise in SIEM tools (e.g., ArcSight, Azure Sentinel) and KQL for log analysis.
  • Familiarity with OSINT techniques for enhanced threat intelligence.
  • Excellent communication skills, with the ability to explain technical issues clearly.
  • Ability to work under pressure and manage workloads effectively.
  • Proactive in learning new technologies and collaborating within the SOC.

This is a great opportunity for cybersecurity professionals eager to grow in threat detection and response while contributing to a high-performing SOC team. Apply today!

Apply now in a few quick clicks

In order to submit this application, a Reed account will be created for you. As such, in addition to applying for this job, you will be signed up to all Reed’s services as part of the process. By submitting this application, you agree to Reed’s Terms and Conditions and acknowledge that your personal data will be transferred to Reed and processed by them in accordance with their Privacy Policy.