SonicJobs Logo
Login
Left arrow iconBack to search

SOC Analyst

Morson Talent
Posted 7 hours ago, valid for 10 days
Location

Pulborough, West Sussex RH202LW, England

Salary

£35,000 - £42,000 per annum

info
Contract type

Full Time

Retirement Plan
Employee Assistance
Employee Discounts

By applying, a CV-Library account will be created for you. CV-Library's Terms & Conditions and Privacy Policy will apply.

SonicJobs' Terms & Conditions and Privacy Policy also apply.

Sonic Summary

info
  • The role involves responding to high-severity cyber incidents, advanced threat hunting, and developing strategies to protect network systems and customer data.
  • Candidates must have significant experience in a SOC Level 2 or 3 role, with a focus on advanced threat hunting and incident response.
  • A Bachelor's degree in Cybersecurity or IT, along with industry-recognized certifications such as CISSP or CEH, is required.
  • The position offers a salary of £60,000 to £70,000 and allows for blended working, with 3 days in the office and 2 days remote.
  • Benefits include a personal pension plan, tenancy loan deposit scheme, and various employee assistance programs.

Your Role:

You will play a critical role in responding to high-severity cyber incidents, performing advanced threat hunting, and developing response strategies to protect our network systems and customer data. This is a key position within our clients Information Systems directorate, and offers blended working, 3 days in office, 2 days remote.

Responsibilities:

- Advanced Threat Hunting: Identify new threats using industry tools and hunt for hidden threats in the environment.
- Policy Development: Develop SOC policies and procedures based on industry best practices.
- Log Management: Ensure all log sources are onboarded into the SIEM solution and create use cases to identify suspicious activity.
- Incident Response: Lead escalated incident responses, oversee remediation, and report on high-severity incidents.
- Security Automation: Develop and automate workflows using SOAR tools to enhance operational playbooks and streamline responses.
- Digital Forensics: Conduct forensic analysis of serious incidents and implement containment strategies.
- Cyber Crisis Testing: Participate in cyber-attack simulations to test and improve organisational resilience.
- Reporting & Metrics: Enhance security operations reporting and develop performance metrics dashboards.
- Audit & Compliance: Support security audits and ensure compliance with relevant regulations and standards.

 

Essential Experience:

- Significant experience in a SOC Level 2 or 3 role, with a strong track record in advanced threat hunting and incident response.
- Qualifications in Cybersecurity or IT (Bachelor's degree or equivalent), ideally with industry-recognized certifications such as CISSP, GIAC, CEH, or CompTIA CASP+.
- Deep knowledge of security technologies (SIEM, SOAR, EDR, IDS/IPS, DLP, etc.), adversarial tactics (e.g., MITRE ATT&CK), and experience with incident response and security architecture.
- Hands-on experience with security tools, including FortiSIEM, McAfee, Darktrace, Microsoft Sentinel, and more.
- Understanding of compliance frameworks such as NCSC CAF, ISO 27001/27002, GDPR, and NIST.

 

Benefits:

- Personal Pension Plan up to 10%
- Tenancy Loan Deposit Scheme
- Cycle to Work Scheme
- Season Ticket Loan
- Occupational Health Support
- Employee Discount Scheme with hundreds of retailers
- Discounted access to sports and social clubs
- Employee Assistance Programme

Next Steps:
To arrange a call to discuss this position in more detail please apply or email your CV to (url removed) .Our client are looking to arrange a MS Teams call as soon as possible for suitable candidates as this role is vital to their long term business aims.

Apply now in a few quick clicks

By applying, a CV-Library account will be created for you. CV-Library's Terms & Conditions and Privacy Policy will apply.

SonicJobs' Terms & Conditions and Privacy Policy also apply.