SonicJobs Logo
Left arrow iconBack to search

SOC Analyst

Network IT
Posted 19 hours ago, valid for 3 days
Location

Solihull, West Midlands B90 4DF

Contract type

Full Time

In order to submit this application, a Reed account will be created for you. As such, in addition to applying for this job, you will be signed up to all Reed’s services as part of the process. By submitting this application, you agree to Reed’s Terms and Conditions and acknowledge that your personal data will be transferred to Reed and processed by them in accordance with their Privacy Policy.

Sonic Summary

info
  • The role of SOC Analyst is fully remote and based in the UK, offering a salary range of £35,000 to £37,000.
  • Candidates should have at least 12 months of experience working within a Security Operations Centre (SOC).
  • The position focuses on Microsoft security services, requiring hands-on experience with SIEM tools such as Azure Sentinel and MS Defender.
  • Successful applicants will be proactive in their approach to Cyber Security and actively pursuing relevant certifications.
  • The role involves monitoring security alerts, analysing threats, and contributing to the continuous improvement of security processes.
Role: SOC AnalystLocation: Fully Remote (UK)Hours of Work: 12-Hour Shifts, 4 On – 4 OffSalary: £35,000 - £37,000Network IT are supporting an MSSP in finding a SOC Analyst to join their established and mature Security Operations Centre (SOC) team.Successful candidates in this role will have gained foundational experience in a Security Operations role, who are looking to specialise in Microsoft-focused security services. (MS Sentinel and MS Defender). Our client offers comprehensive training and support, who will push for you to gain Microsoft security certifications (e.g. SC-200).Ultimately, our client is looking for someone who is proactive with a hunger to develop, someone who is actively exploring Cyber Security outside their normal role responsibilities or during their own time, and has gained and is continuing to work towards building their security certifications.Responsibilities:
  • Monitor and respond to security alerts from a variety of security and IT tools (e.g. Microsoft Sentinel).
  • Proactively analyse security alerts to detect anomalous behaviour and identify potential threats
  • Prioritising alerts according to their criticality, tackling threats in the first instance and escalating when required.
  • Limit business disruption from malicious activity, contain and eradicate malicious activity from information systems.
  • Operate SIEM tools to high efficiency, provide suggestion for continuous improvement through creation and tuning of SIEM rules.
  • Documentation of incidents and investigations.
  • Research the latest on security/cyber threats, which can drive improvements with existing tools and processes.
Experience
  • 12-months experience working within a Security Operations Centre (SOC).
  • Hands-on experience with Security Incident and Event Management (SIEM) tools (e.g. Azure Sentinel, MS Defender, Splunk, SentinelOne, CrowdStrike)
  • Familiarity with Endpoint Detection and Response (EDR) tools.
  • Relevant SOC/Cyber Security certifications (e.g. Blue Team Level 1, SC-900, CompTIA Security+, CompTIA Network+)
  • Proactive attitude towards developing in Cyber Security.

Apply now in a few quick clicks

In order to submit this application, a Reed account will be created for you. As such, in addition to applying for this job, you will be signed up to all Reed’s services as part of the process. By submitting this application, you agree to Reed’s Terms and Conditions and acknowledge that your personal data will be transferred to Reed and processed by them in accordance with their Privacy Policy.