At a Glance
- Tasks: Monitor and investigate security incidents while leading a dynamic SOC team.
- Company: Join Sopra Steria, a leader in digital solutions for Defence and Security.
- Benefits: Enjoy 25 days annual leave, health cash plan, life assurance, and flexible benefits.
- Why this job: Make a real impact on National Security while developing your skills in a supportive environment.
- Qualifications: Experience in a SOC, knowledge of Microsoft Sentinel or Splunk, and networking principles required.
- Other info: Eligible for DV Clearance; apply even if you're unsure about meeting all qualifications!
The predicted salary is between 43200 - 72000 £ per year.
Are you in a Security Operations Centre and every day is the same? We can assure you that there is no boredom in our role. We have a growing Cyber practice in our Defence sector and support enterprise scale clients. Now we have opportunities for L2 SOC Analysts to join in our success and work with multiple, high profile clients. You must have proven experience working in a busy SOC with a tech-first approach and be able to lead from the front.
From a technical perspective we are using Microsoft Sentinel, Splunk and MISP Threat sharing so any knowledge of these technologies would be a substantial benefit. This role is based out of our head office in Hemel Hempstead and will work on a shift pattern with 12 hour shifts (Nights and Days). You do need to be eligible for DV Clearance.
We can offer great career progression opportunities, benefits which you can flex to meet your needs and training and development opportunities.
What you will be doing:
- Monitor, triage, and investigate security incidents on critical client infrastructure.
- In-depth analysis of network traffic, logs, and system events to identify potential security threats and vulnerabilities.
- Provide Incident Response support.
- Maintain, improve and develop team knowledge of SOC tools, security operations and triage.
- Prepare reports for managed clients to both technical and non-technical audiences and continuously improve their content and presentation.
- Maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies.
What you will bring:
- Experience in Security Operations Centre.
- Demonstrable experience of Managing Microsoft Sentinel or Splunk implementations.
- Knowledge and experience with Mitre Att&ck Framework.
- Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products.
- Deep technical knowledge in the analysis of log data and intrusion detection systems.
- Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP.
It would be great if you had:
- Understanding of static malware analysis and reverse engineering.
- CREST Practitioner Intrusion Analyst.
- Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated.
If you are interested in this role but not sure if your skills and experience are exactly what we’re looking for, please do apply, we’d love to hear from you!
Employment Type: Permanent
Location: Hemel Hempstead office based
Security Clearance Level: Eligible for DV Clearance
Internal Recruiter: Jane
Benefits: 25 days annual leave with the choice to buy additional days, health cash plan, life assurance, pension, and generous flexible benefits fund.
Loved reading about this job and want to know more about us? Sopra Steria’s Aerospace, Defence and Security business designs, develops and deploys digital solutions to Central Government clients. The work we do makes a real difference to the client’s goal of National Security, and we operate in a unique and privileged environment. We are given time for professional development activities, and we coach and mentor our colleagues, sharing knowledge and learning from each other. We foster a culture in which employees feel valued and supported and have pride in their work for the customer, delivering outstanding rates of customer satisfaction in the UK’s most complex safety- and security-critical markets.
Senior SOC Analyst employer: Sopra Steria Ltd
Contact Detail:
Sopra Steria Ltd Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior SOC Analyst
✨Tip Number 1
Familiarise yourself with Microsoft Sentinel and Splunk, as these are key technologies used in the role. Consider taking online courses or certifications to deepen your understanding and demonstrate your commitment to mastering these tools.
✨Tip Number 2
Network with current SOC Analysts or professionals in the cybersecurity field. Engaging with them on platforms like LinkedIn can provide insights into the role and may even lead to referrals, which can significantly boost your chances of landing the job.
✨Tip Number 3
Stay updated on the latest trends and threats in cybersecurity. Follow relevant blogs, podcasts, and forums to ensure you can speak knowledgeably about current issues during interviews, showcasing your passion and expertise in the field.
✨Tip Number 4
Prepare to discuss your experience with incident response and threat analysis in detail. Be ready to share specific examples of how you've handled security incidents in the past, as this will demonstrate your practical skills and ability to lead in a busy SOC environment.
We think you need these skills to ace Senior SOC Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience in Security Operations Centres, particularly with Microsoft Sentinel and Splunk. Use specific examples of your past roles to demonstrate your technical skills and leadership abilities.
Craft a Compelling Cover Letter: Write a cover letter that showcases your passion for cybersecurity and your understanding of the role. Mention your familiarity with the Mitre Att&ck Framework and any relevant certifications, such as CREST Practitioner Intrusion Analyst.
Highlight Relevant Experience: In your application, emphasise your experience with incident response and your ability to analyse network traffic and logs. Provide concrete examples of how you've identified and mitigated security threats in previous positions.
Showcase Continuous Learning: Mention any ongoing training or professional development activities you are involved in. This could include courses on SIEM technologies or participation in cybersecurity workshops, which will demonstrate your commitment to staying current in the field.
How to prepare for a job interview at Sopra Steria Ltd
✨Showcase Your Technical Expertise
Make sure to highlight your experience with Microsoft Sentinel, Splunk, and MISP Threat sharing during the interview. Be prepared to discuss specific instances where you've used these tools to monitor or respond to security incidents.
✨Demonstrate Your Incident Response Skills
Prepare examples of how you've effectively triaged and investigated security incidents in a busy SOC environment. Discuss your approach to incident response and how you maintain documentation for security incidents.
✨Familiarise Yourself with Networking Principles
Brush up on your knowledge of networking principles, including TCP/IP and common Internet protocols. Be ready to explain how these concepts relate to security operations and incident detection.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your problem-solving skills in real-time situations. Think about how you would handle various security threats and be ready to articulate your thought process clearly.