SonicJobs Logo
Left arrow iconBack to search

Senior SOC Analyst

Jumar Solutions
Posted 8 hours ago, valid for 8 days
Location

Stevenage, Hertfordshire SG1 1PX

Salary

£48,000 - £57,600 per annum

info
Contract type

Full Time

By applying, a CV-Library account will be created for you. CV-Library's Terms & Conditions and Privacy Policy will apply.

Sonic Summary

info
  • The position is for a Senior SOC Analyst located on-site in Stevenage, working inside IR35 regulations.
  • Candidates must have a minimum of 3 years' experience in Security Operations Centres (SOCs) or as a security analyst.
  • The role requires active security clearance and involves 12-hour shifts, either from 7am to 7pm or 7pm to 7am.
  • Experience with tools such as LogRhythm, Splunk, Darktrace, and FireEye is essential, along with a strong understanding of network protocols.
  • The salary for this role is competitive and commensurate with experience.
Senior Soc Analyst
On site Stevenage
Inside IR35

Due to timescale of the project the ideal candidate will hold Active Security Clearance

24/7 Desk 12 hour shifts days 7am-7pm days or 7pm-7am nights


The Candidate
  • Experience with LogRhythm/ Splunk, Darktrace (Threat Visualizer) and FireEye (EX, NX, HX, CMS) is required.
  • Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S.
  • Knowledge or experience with any of the following is a plus: Observe IT, Symantec MessageLabs, IronPort, Splunk Phantom and Recorded Future.
  • Experience or demonstrable knowledge in Incident response, log analysis and PCAP analysis
  • Good level of understanding in the approach threat actors take to attacking a network; phishing, port scanning, web application attacks, DDoS, lateral movement.
  • Knowledge in Windows and/or Linux operating systems, how to investigate them for signs of compromise.
  • Ability to demonstrate the right approach to investigating alerts and/or indicators and document your findings in a manner that both peer and executive level colleagues can understand.
  • Ability to track complex remedial activities from multiple sources and provide updates to the customer in a user centric way.
  • Ability to clearly articulate cyber security risks against business outcomes and provide advice on the remedial actions that should be undertaken.
  • Used to managing and collaborating with multiple team members and reporting progress to stakeholders.
  • Experience in managing security incidents on behalf of stakeholders.
  • Experience within Defensive Cyber-attack methodologies and frameworks.
  • Foundational level of scripting knowledge is desirable.
  • 3+ years' experience working within Security Operations Centres (SOCs) or as a security analyst to resolve security incidents across a range of tools as listed above.
  • Excellent verbal and written communications

Apply now in a few quick clicks

By applying, a CV-Library account will be created for you. CV-Library's Terms & Conditions and Privacy Policy will apply.