SonicJobs Logo
Left arrow iconBack to search

Microsoft Sentinel Engineer/L3 SOC Analyst

Akkodis
Posted 7 hours ago, valid for a day
Location

London, Greater London EC1R 0WX

Salary

£90,000 - £108,000 per annum

info
Contract type

Full Time

In order to submit this application, a Reed account will be created for you. As such, in addition to applying for this job, you will be signed up to all Reed’s services as part of the process. By submitting this application, you agree to Reed’s Terms and Conditions and acknowledge that your personal data will be transferred to Reed and processed by them in accordance with their Privacy Policy.

Sonic Summary

info
  • Akkodis is seeking a Microsoft Sentinel Engineer/L3 SOC Analyst with expertise in Microsoft Sentinel and QRadar for a fully remote position.
  • Candidates should have senior cyber security experience, with a focus on managing Microsoft Sentinel, and at least 5 years of relevant experience.
  • The role involves overseeing security incidents, providing guidance to junior analysts, and supporting the implementation of new Microsoft security technologies.
  • The salary for this position is competitive and commensurate with experience, but specific figures are not provided in the job description.
  • Applicants must be eligible for security clearance, and experience in penetration testing or security monitoring is preferred.

Microsoft Sentinel Engineer/L3 SOC Analyst

Akkodis are currently working in partnership with a leading service provider to recruit an experienced Microsoft Sentinel Engineer with expertise of Microsoft Sentinel and QRadar to join their growing security team during an exciting period of change.

Please note this is a fully remote role and you must be eligible to gain security clearance (do not need to hold currently).

The Role

As a Microsoft Sentinel Engineer you will be responsible for handing security incidents received/escalated for the junior analysts in the team. You will aid in triaging threat intelligence from multiple sources and add contextual information to the security incident, perform additional analysis and based on the business impact will recommend the response actions and escalation path. You will also have the opportunity to support the initial implementation of new security related Microsoft technologies, including Microsoft Sentinel, MDE, MDI and Defender for Cloud.

The Responsibilities

  • Oversee completion of day-to-day checklist(s), including log review, management report scheduling & running, alert analysis, and escalation follow up
  • Remain current on cyber security trends and intelligence (open source and commercial) in order to guide the security analysis & identification capabilities of the CSOC team
  • Provide oversight, guidance and mentoring to L2 & L3 analysts, and fulfil SOC Manager responsibilities in the absence of the SOC Manager
  • Manage a number of analysts as part of a virtual team of L1 and L2 analysts, including objectives setting, performance management / reviews, training & development, and BAU activities including shift cover etc.
  • Perform advanced event and incident analysis, including baseline establishment and trend analysis.
  • Support on-call arrangements as part of a Rota, to support L1 Analysts working out of hours
  • Support Major Incident Response activity, from a Protective Monitoring perspective, including supporting teams in identification, containment, and remediation of security related threat.
  • Provide timely advice and guidance on the response action plans for events and incidents based on incident type and severity.
  • Identify, create and implement improvements to procedures and processes, with the SOC Manager's approval.
  • Identify opportunities for SOC and client SIEM platform configuration improvements, use case development, monitoring rule creation, tuning & optimisation
  • Assist in architectural design to facilitate the onboarding of new information systems, including the assessment, parsing, onboarding of log sources, and use case and rule development.

The Requirements

  • Senior Cyber Security and security operations experience
  • Experience in managing Microsoft Sentinel, including Lighthouse
  • Experience of onboarding, tuning, reporting and configuring SIEM solutions
  • Experience of threat intelligence
  • Leadership and mentoring experience and skills
  • Understanding of low-level concepts including operating systems and networking
  • Commercial experience in Penetration Testing and / or Security Monitoring
  • Understanding of networking and infrastructure design
  • Active or ability to obtain SC clearance
  • Knowledge/experience of DevOps would be hugely beneficial

If you are looking for an exciting new challenge to join a leading SOC team please apply now.

Modis International Ltd acts as an employment agency for permanent recruitment and an employment business for the supply of temporary workers in the UK. Modis Europe Ltd provide a variety of international solutions that connect clients to the best talent in the world. For all positions based in Switzerland, Modis Europe Ltd works with its licensed Swiss partner Accurity GmbH to ensure that candidate applications are handled in accordance with Swiss law.

Both Modis International Ltd and Modis Europe Ltd are Equal Opportunities Employers.

By applying for this role your details will be submitted to Modis International Ltd and/ or Modis Europe Ltd. Our Candidate Privacy Information Statement which explains how we will use your information is available on the Modis website.

Apply now in a few quick clicks

In order to submit this application, a Reed account will be created for you. As such, in addition to applying for this job, you will be signed up to all Reed’s services as part of the process. By submitting this application, you agree to Reed’s Terms and Conditions and acknowledge that your personal data will be transferred to Reed and processed by them in accordance with their Privacy Policy.