SonicJobs Logo
Left arrow iconBack to search

SOC Analyst - 24/7 shift - Remote - Multiple headcount

Gibbs Hybrid
Posted a day ago, valid for a day
Location

Wallington, Surrey SM6 9AY

Salary

£37 - £51.58 per hour

Contract type

Full Time

In order to submit this application, a Reed account will be created for you. As such, in addition to applying for this job, you will be signed up to all Reed’s services as part of the process. By submitting this application, you agree to Reed’s Terms and Conditions and acknowledge that your personal data will be transferred to Reed and processed by them in accordance with their Privacy Policy.

Sonic Summary

info
  • The SOC Analyst position is a remote, 12-month contract role requiring 1 to 3 years of relevant experience in cybersecurity.
  • The role involves 24/7 monitoring and responding to cybersecurity alerts, with a focus on incident detection, response, and management.
  • The pay ranges from £37 to £51.58 per hour, depending on whether the candidate is paid through PAYE or an umbrella company.
  • Candidates should have a degree in a related field or equivalent work experience, along with cybersecurity certifications being a plus.
  • The ideal candidate will possess knowledge of analysis frameworks and fundamental security concepts related to cloud platforms and networks.

SOC Analyst - 24/7 shift - Remote - Multiple headcount

Duration: 12 months contract

Location: Remote

Pay: £37 - £51.58/hour (rate dependant on PAYE or umbrella route)

The SOC provides 24/7/365 monitoring and responds to cybersecurity alerts for the organization Provides rapid response to incoming security alerts, enriches those alerts with an initial triage effort. This is a 24/7 shift role

Job Function Description

Positions in this function are involved in the body of technologies, processes, and practices designed to protect and defend networks, computers, programs, and data from attack, damage, theft, or unauthorized access. Functions focus on cybersecurity incident detection, response, and management.

Job Profile

  • Monitors work queues for alerts of potential network threats, intrusions, and/or compromises.
  • Assess validity and scope to determine if the alert is actionable and determine remediation steps required.
  • Confirm accuracy of the alerting information.
  • Identify malicious behaviors and respond to them.
  • Determine remediation actions needed.
  • Escalate incident to proper team where required.

Job Scope and Guidelines

  • Experience and knowledge conducting analysis of cybersecurity threats.
  • Experience in cybersecurity event monitoring/analysis in a Security Operations Center environment.
  • Efficient documentation of triage details, sources of information, and recommendations for response.

Minimum Educational Background

One, or more, of the following:

1. BS/BA in Computer Science, Computer Engineering, Cyber Security, Forensics and/or equivalent work experience.

2. 1 to 3 years of relevant work experience.

3. Certification in cybersecurity (e.g., Security+, CCNA Cyber Ops, CCSP, GCIA, GCIH, CEH, CySA+, OSCP, etc.)

Functional Competency & Description

Knowledge of industry recognized analysis frameworks (Kill Chain, Diamond Model, MITRE ATT&CK, NIST Incident Response, etc.)

Thorough understanding of fundamental security related to cloud platforms (AWS, Azure, GCP, etc.)

Thorough understanding of fundamental security and network concepts (Operating systems, intrusion/detection, TCP/IP, ports, etc.)

Willing to work in a team-oriented 24/7 SOC environment; flexibility to work on a rotating schedule

Apply now in a few quick clicks

In order to submit this application, a Reed account will be created for you. As such, in addition to applying for this job, you will be signed up to all Reed’s services as part of the process. By submitting this application, you agree to Reed’s Terms and Conditions and acknowledge that your personal data will be transferred to Reed and processed by them in accordance with their Privacy Policy.