SonicJobs Logo
Login
Left arrow iconBack to search

OT SOC Analyst - Operational Technology

Morson Edge
Posted a day ago, valid for a day
Location

Pulborough, West Sussex RH202LW, England

Salary

£600 - £800 per day

Contract type

Full Time

By applying, a CV-Library account will be created for you. CV-Library's Terms & Conditions and Privacy Policy will apply.

SonicJobs' Terms & Conditions and Privacy Policy also apply.

Sonic Summary

info
  • The OT SOC Analyst position is a 6 to 9-month contract role located in Crawley, offering a hybrid work model with two days on-site each week.
  • This role requires extensive experience as a Level 3 Analyst in Incident Response (CSIRT) and Security Operations Centre (SOC), particularly in critical national infrastructure and defense environments.
  • Key responsibilities include threat hunting, incident response leadership, policy creation, and automation of security processes to minimize business impact from cyber threats.
  • Candidates should have a strong background in cyber incident leadership and SOC operations, with desirable skills in threat hunting and security monitoring tooling.
  • The position is outside IR35 and offers a competitive salary, although the specific salary range is not disclosed in the job description.

OT SOC Analyst (Operational Technology)

Outside IR35

Duration: 6 – 9 months

Location: Crawley, Hybrid 2 days per week on site

Overview of project:

The role of an Incident Response (CSIRT) / Security Operations Centre (SOC) Level 3 Analyst is to respond to high-severity cyber security incidents and/or escalated events and alerts then, using experience combined with industry tools and techniques, expediate a containment, eradication and recovery strategy to minimise business impact and ensure UK Power Networks (UKPN) network systems and customer data are protected from cyber threats.

Overview of role and responsibilities:

  • Threat Hunting: Analyse intel and IOCs to find and remove hidden threats across UKPN's OT/IT environments.
  • Policy: Create SOC policies, standards and procedures aligned with best practice.
  • Logs: Ensure all logs feed into the SIEM and build use cases to detect anomalous activity.
  • Incident Response: Lead high-severity incidents, improve playbooks and manage remediation, communication and reporting.
  • SOAR: Develop automated workflows to streamline detection, enrichment and response.
  • Forensics: Perform forensic analysis across multiple data sources and recommend containment and eradication actions.
  • Crisis Testing: Take part in cyber-attack simulations to strengthen resilience.
  • Reporting: Improve reporting dashboards and key security metrics.
  • Tooling: Support and maintain security tools and platforms for threat prevention, detection and response.
  • Audit: Support SOC2/NCSC CAF/ISO27001 audits and ensure compliance.
  • Continuous Improvement: Automate and enhance monitoring, detection and response based on evolving threats.

Skills, experience and previous achievements required:

Essential

  • Extensive End to End Cyber Incident Leadership Experience
  • Extensive SOC L3 / CSIRT L3 Experience
  • Extensive CNI / Defence / Business Critical Environment Experience

Desirable

  • Threat Hunting Experience
  • Threat Hunting Strategy Mindset
  • Runbook & Playbook Authoring
  • Lessons Learned / Root Cause Analysis Leader
  • Experience working with and enhancing security monitoring tooling
  • Extensive IT/OT Systems Experience
  • Extensive CNI & OT Environment Awareness
  • Experience aligning with organisational requirements and contributing to audit readiness

Tickets/Qualifications/Accreditations required to carry out the role:

  • Desirable - Cyber and OT Certification

Previous companies of interest:

  • MOD or similar

Apply now in a few quick clicks

By applying, a CV-Library account will be created for you. CV-Library's Terms & Conditions and Privacy Policy will apply.

SonicJobs' Terms & Conditions and Privacy Policy also apply.