At a Glance
- Tasks: Monitor and respond to security incidents in a fast-paced environment.
- Company: Join a leading cybersecurity firm dedicated to protecting businesses from cyber threats.
- Benefits: Enjoy a full-time role with a 4 on 4 off shift pattern, offering work-life balance.
- Why this job: Be part of a dynamic team making a real impact in the world of cybersecurity.
- Qualifications: 2+ years in SOC or as a security analyst; experience with key security tools required.
- Other info: Must be a British National; ideally SC cleared or eligible.
The predicted salary is between 30000 - 42000 £ per year.
Location: Stevenage (Full time onsite)
Shift: 24/7 Desk, 4 on 4 off days & nights
Must be British National - No Dual Nationality
Ideally SC Cleared - Must be eligible at least
The Candidate
- Experience with LogRhythm/Splunk, Darktrace (Threat Visualizer) and FireEye (EX, NX, HX, CMS) is required.
- Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S.
- Knowledge or experience with any of the following is a plus: Observe IT, Symantec MessageLabs, IronPort, Splunk Phantom and Recorded Future.
- Experience or demonstrable knowledge in Incident response, log analysis and PCAP analysis.
- Good level of understanding in the approach threat actors take to attacking a network; phishing, port scanning, web application attacks, DDoS, lateral movement.
- Knowledge in Windows and/or Linux operating systems, how to investigate them for signs of compromise.
- Ability to demonstrate the right approach to investigating alerts and/or indicators and document your findings in a manner that both peer and executive level colleagues can understand.
- Ability to track complex remedial activities from multiple sources and provide updates to the customer in a user centric way.
- Ability to clearly articulate cyber security risks against business outcomes and provide advice on the remedial actions that should be undertaken.
- Used to managing and collaborating with multiple team members and reporting progress to stakeholders.
- Experience in managing security incidents on behalf of stakeholders.
- Experience within Defensive Cyber-attack methodologies and frameworks.
- Foundational level of Scripting knowledge is desirable.
- 2+ years' experience working within Security Operations Centres (SOCs) or as a security analyst to resolve security incidents across a range of tools as listed above.
- Excellent verbal and written communications.
Junior SOC Analyst employer: Jumar Solutions Ltd
Contact Detail:
Jumar Solutions Ltd Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Junior SOC Analyst
✨Tip Number 1
Familiarise yourself with the specific tools mentioned in the job description, such as LogRhythm, Splunk, and Darktrace. Consider setting up a home lab or using online resources to gain hands-on experience with these platforms, as practical knowledge can set you apart during interviews.
✨Tip Number 2
Brush up on your understanding of the OSI Reference Model and network protocols. Being able to discuss these concepts confidently will demonstrate your technical expertise and show that you can effectively communicate complex ideas to both peers and executives.
✨Tip Number 3
Network with professionals already working in SOCs or related fields. Attend cybersecurity meetups or webinars to connect with industry insiders who can provide insights into the role and potentially refer you to opportunities at StudySmarter.
✨Tip Number 4
Prepare for scenario-based questions that may be asked during the interview. Think about past experiences where you've handled security incidents or analysed logs, and be ready to articulate your thought process and the outcomes of your actions.
We think you need these skills to ace Junior SOC Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience with LogRhythm, Splunk, and other tools mentioned in the job description. Emphasise your understanding of network protocols and any incident response experience.
Craft a Strong Cover Letter: In your cover letter, explain why you are interested in the Junior SOC Analyst position. Mention your familiarity with the OSI Reference Model and how your skills align with the company's needs.
Showcase Communication Skills: Since excellent verbal and written communication is crucial for this role, provide examples in your application that demonstrate your ability to articulate complex cyber security concepts clearly.
Highlight Team Collaboration: Discuss your experience working in teams and managing security incidents. Provide specific examples of how you've collaborated with colleagues and reported progress to stakeholders.
How to prepare for a job interview at Jumar Solutions Ltd
✨Showcase Your Technical Skills
Be prepared to discuss your experience with tools like LogRhythm, Splunk, and Darktrace. Highlight specific instances where you've used these tools to analyse logs or respond to incidents, as this will demonstrate your hands-on knowledge.
✨Understand the OSI Model
Make sure you can explain the OSI Reference Model and how it relates to network communication protocols. Being able to articulate this clearly will show your foundational understanding of networking, which is crucial for a Junior SOC Analyst.
✨Communicate Clearly
Practice explaining complex cyber security concepts in simple terms. You may need to communicate findings to both technical peers and non-technical stakeholders, so being able to adapt your communication style is key.
✨Demonstrate Incident Response Knowledge
Prepare to discuss your approach to incident response. Share examples of past experiences where you managed security incidents, detailing the steps you took and the outcomes. This will illustrate your capability to handle real-world scenarios.