At a Glance
- Tasks: Join our team as a SOC Analyst (Tier 2) to tackle cyber threats and mentor junior analysts.
- Company: Be part of a leading global IT & Consultancy firm based in Glasgow, driving innovation.
- Benefits: Enjoy a competitive salary, shift allowances, and opportunities for professional growth.
- Why this job: Make a real impact in cybersecurity while working in a dynamic and supportive environment.
- Qualifications: Must have 6 months experience in SIEM technologies and active SC clearance.
- Other info: Full-time on-site role with a 24x7 shift pattern; ideal for those passionate about cyber security.
The predicted salary is between 34000 - 48000 £ per year.
Our market-leading global client requires a SOC Analyst (Tier 2) with a breadth of experience across Cyber Security to join the team, throughout an exciting period of Change & Innovation. The role will be working with a global IT & Consultancy company, based in Glasgow, on multiple workstreams of a variety of complexity and scale.
This is a mid-Tier position within the Cyber Threat Analysis Centre (CTAC), responsible for advancing the initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organisation. The role is crucial in the investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts. The Tier 2 Analyst will work closely with senior and junior analysts to ensure a seamless SOC operation and act as a bridge between foundational and advanced threat detection and response functions.
This is a full-time on-site role, covering a 24x7 shift pattern, which will come with a shift allowance. Candidates will be required to have active SC, moving to DV clearance and must have at least 6 months working experience in SIEM technologies.
Responsibilities:- Conduct escalated triage and analysis on security events identified by Tier 1 Analysts
- Apply expertise in SIEM solutions utilising Kusto Query Language (KQL)
- Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action
- Monitor the threat landscape and document findings on evolving threat vectors
- Follow established incident response playbooks, providing feedback for enhancements and streamlining CTAC processes
- Co-ordinate with Tier 3 Analysts and management to refine detection and response workflows
- Collaborate with Tier 3 Analysts on tuning SIEM and detection tools to reduce false positives and improve alert fidelity
- Identify gaps in current detection content and work with Senior Analysts to develop and validate new detection rules
- Act as a mentor to Tier 1 Analysts and facilitate on-the-job training to elevate their technical skills and operational efficiency
- Assist in training sessions and knowledge-sharing activities, providing feedback on areas for growth and contributing to a supportive learning environment within the SOC.
- Understands advanced networking concepts, including IP addressing and basic network protocols
- Advanced knowledge of Windows and Linux operating environments
- Competence in using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis
- Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search and filter logs effectively.
- Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information.
- Able to communicate clearly and efficiently with team members and stakeholders
- Can communicate simple technical issues to non-technical individuals in a clear and understandable way.
- Able to create concise, structured reports
- Able to function efficiently during high-pressure situations
The above is not exhaustive. To discuss this opportunity in more detail, please forward your CV to.
SOC Analyst (Tier 2) in Glasgow employer: Sanderson Recruitment
Contact Detail:
Sanderson Recruitment Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Analyst (Tier 2) in Glasgow
✨Tip Number 1
Familiarise yourself with the specific SIEM technologies mentioned in the job description, such as ArcSight and Azure Sentinel. Having hands-on experience or relevant certifications can significantly boost your confidence and demonstrate your expertise during interviews.
✨Tip Number 2
Brush up on your Kusto Query Language (KQL) skills. Practising writing queries to filter and analyse logs will not only prepare you for the technical aspects of the role but also show your proactive approach to mastering essential tools.
✨Tip Number 3
Network with current SOC Analysts or professionals in the cyber security field. Engaging in discussions about their experiences and challenges can provide valuable insights and may even lead to referrals or recommendations for the position.
✨Tip Number 4
Prepare to discuss real-world scenarios where you've successfully triaged or responded to security incidents. Being able to articulate your thought process and actions taken during high-pressure situations will showcase your problem-solving abilities and readiness for the role.
We think you need these skills to ace SOC Analyst (Tier 2) in Glasgow
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in Cyber Security, particularly with SIEM technologies and Kusto Query Language (KQL). Emphasise any previous roles that involved threat analysis or incident response.
Craft a Strong Cover Letter: Write a cover letter that specifically addresses the responsibilities of the SOC Analyst (Tier 2) role. Mention your understanding of advanced networking concepts and your ability to mentor Tier 1 Analysts, as these are key aspects of the job.
Showcase Relevant Skills: In your application, clearly outline your skills in using SIEM solutions and your familiarity with open-source intelligence (OSINT) techniques. Provide examples of how you've applied these skills in past roles.
Proofread Your Application: Before submitting, carefully proofread your CV and cover letter for any errors. A well-presented application reflects your attention to detail, which is crucial in a Cyber Security role.
How to prepare for a job interview at Sanderson Recruitment
✨Showcase Your Technical Skills
Be prepared to discuss your experience with SIEM technologies and Kusto Query Language (KQL). Highlight specific instances where you've successfully used these tools to identify and respond to threats.
✨Demonstrate Problem-Solving Abilities
Expect scenario-based questions that assess your ability to handle high-pressure situations. Prepare examples of past incidents where you effectively triaged and resolved security events.
✨Communicate Clearly
Since the role involves mentoring Tier 1 Analysts, practice explaining complex technical concepts in simple terms. This will show your ability to communicate effectively with both technical and non-technical team members.
✨Research the Company and Its Culture
Understand the company's approach to cyber security and their current challenges. This knowledge will help you tailor your responses and demonstrate your genuine interest in contributing to their team.