SonicJobs Logo
Left arrow iconBack to search

Junior SOC Analyst

Jumar Solutions
Posted an hour ago, valid for 24 days
Location

Stevenage, Hertfordshire SG1 1PX

Salary

£290 per day

Contract type

Full Time

By applying, a CV-Library account will be created for you. CV-Library's Terms & Conditions and Privacy Policy will apply.

Sonic Summary

info
  • A Junior SOC Analyst position is available in Stevenage, requiring full-time onsite work on a 4 on 4 off schedule for both days and nights.
  • The role offers a pay rate of £290 per day and candidates must be eligible for Security Clearance as it operates inside IR35.
  • Candidates should have experience with security tools such as LogRhythm, Splunk, Darktrace, and FireEye, along with a solid understanding of network communication protocols.
  • The ideal candidate will have knowledge of incident response, log analysis, and cyber attack methodologies, as well as experience with Windows and Linux operating systems.
  • Excellent verbal and written communication skills are essential, as the role involves articulating cybersecurity risks and managing security incidents for stakeholders.
Junior SOC Analyst
Location: Stevenage (Full time onsite)
247 Desk 4 on 4 off days & nights
290 per day working inside iR35
Must be eligible for Security Clearance



Are you a junior Security Analyst looking for an opportunity to develop a career within a SOC environment, learn new skills, work with a diverse and talented team as well as working with cutting edge security technology then look no further!


The Candidate
  • Experience with LogRhythm/ Splunk, Darktrace (Threat Visualizer) and FireEye (EX, NX, HX, CMS) is required.
  • Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S.
  • Knowledge or experience with any of the following is a plus: Observe IT, Symantec MessageLabs, IronPort, Splunk Phantom and Recorded Future.
  • Experience or demonstrable knowledge in Incident response, log analysis and PCAP analysis
  • Good level of understanding in the approach threat actors take to attacking a network; phishing, port scanning, web application attacks, DDoS, lateral movement.
  • Knowledge in Windows and/or Linux operating systems, how to investigate them for signs of compromise.
  • Ability to demonstrate the right approach to investigating alerts and/or indicators and document your findings in a manner that both peer and executive level colleagues can understand.
  • Ability to track complex remedial activities from multiple sources and provide updates to the customer in a user centric way.
  • Ability to clearly articulate cyber security risks against business outcomes and provide advice on the remedial actions that should be undertaken.
  • Experience in managing security incidents on behalf of stakeholders.
  • Experience within Defensive Cyber-attack methodologies and frameworks.
  • Foundational level of scripting knowledge is desirable.
  • Excellent verbal and written communications

Apply now in a few quick clicks

By applying, a CV-Library account will be created for you. CV-Library's Terms & Conditions and Privacy Policy will apply.