At a Glance
- Tasks: Join a dynamic SOC team to lead cyber incident management and proactive threat hunting.
- Company: Work for a top IT company known for its cutting-edge technology and exceptional talent.
- Benefits: Enjoy flexible working, top training, and certification programmes with a people-first culture.
- Why this job: This role offers continuous growth in cyber security with the latest tech and impressive clients.
- Qualifications: 2+ years in a SOC environment, experience with SIEM tools, and relevant cyber security certifications.
- Other info: Candidates must be eligible for SC clearance upon hire.
The predicted salary is between 36000 - 60000 £ per year.
My client is one of the most recognisable names in IT and has some of the best people in the industry working for them. They are top partners with all the top vendors, which means you get to work with the best technology, the best people, the best training, the best certification programmes, and the best environment to grow!
Why?
- Work with some of the best cyber consultants in the country.
- The pathway to do whatever you want in cyber is continuous.
- People first culture.
- The latest, cutting-edge technology.
You will join a 24/7 SOC team, involved in the highest level of Incident Response activities, proactive threat hunting, and development of detection and use-case capabilities. You will be working alongside the engineering team to help find tuning optimisation opportunities.
Candidates MUST have or be eligible to gain SC clearance upon hire.
Key Skills required:
- 2+ years' experience working in a SOC environment - ideally MSSP. Experience in a technical security role is also considered.
- Experience with SIEM tools, such as MS Sentinel, Alien Vault, or Splunk.
- A cyber security qualification, certification, or degree e.g. CySA+, CompTIA SEC+, or similar experience. Microsoft SC-200 Certs are desirable.
- Excellent communication skills.
- A strong knowledge of sophisticated threat actor methodologies, along with experience in incident response and forensic investigations.
This business has a clear picture of where they want to be, has the right individuals steering the ship, and exceptional tech talent leading the way. Impressive customers, flexible working, and a company that truly cares.
Responsibilities:
- Leading escalated Cyber Incident Management, including Major Incidents and 2nd/3rd line analysis for ongoing investigations.
- Carrying out proactive threat hunts, RCAs, creation of detection capabilities.
- Monitor/hunt security alerts from security platforms (SIEM platforms, such as MS Sentinel, Alien Vault, or Splunk).
- Act on Second Line security alerts, incidents, requests, and events to ensure that threats, vulnerabilities, and breaches are managed for successful resolution.
- Document and manage cases to utilise information for customer reports, to provide insightful and intelligent recommendations.
- Facilitate recovery, following the resolution of incidents.
- Provide subject matter expertise regarding exploits, threat actors, TTPs, etc.
- Maintain high quality across SLAs and KPIs.
Please hit the button to Apply and/or email (see below) or call for further info.
L2 & L3 SOC/Cyber Security Engineer - Threat Hunter/SIEM Sentinel employer: InfraView - Specialist Cloud & IT Infrastructure Technology Recruitmen
Contact Detail:
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitmen Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land L2 & L3 SOC/Cyber Security Engineer - Threat Hunter/SIEM Sentinel
✨Tip Number 1
Familiarise yourself with the latest SIEM tools, especially Microsoft Sentinel, as this role heavily involves their use. Consider setting up a lab environment to practice your skills and demonstrate your hands-on experience during interviews.
✨Tip Number 2
Stay updated on current cyber threats and methodologies used by sophisticated threat actors. Engaging in online forums or following industry leaders on social media can provide insights that you can discuss in your interviews.
✨Tip Number 3
Network with professionals in the cybersecurity field, particularly those working in SOC environments. Attend relevant meetups or webinars to make connections that could lead to referrals or insider information about the job.
✨Tip Number 4
Prepare to showcase your incident response experience through real-world examples. Be ready to discuss specific incidents you've managed, the tools you used, and the outcomes, as this will highlight your practical knowledge and problem-solving skills.
We think you need these skills to ace L2 & L3 SOC/Cyber Security Engineer - Threat Hunter/SIEM Sentinel
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in SOC environments and technical security roles. Emphasise your familiarity with SIEM tools like MS Sentinel, Alien Vault, or Splunk, as well as any cyber security qualifications you hold.
Craft a Strong Cover Letter: In your cover letter, express your passion for cyber security and detail how your skills align with the responsibilities of the role. Mention specific experiences that demonstrate your ability to lead incident management and conduct proactive threat hunts.
Highlight Communication Skills: Since excellent communication skills are essential for this position, provide examples in your application that showcase your ability to convey complex information clearly, whether through reports or during incident response.
Showcase Continuous Learning: Mention any ongoing training, certifications, or courses you are pursuing in cyber security. This demonstrates your commitment to professional growth and aligns with the company's culture of continuous development.
How to prepare for a job interview at InfraView - Specialist Cloud & IT Infrastructure Technology Recruitmen
✨Showcase Your Technical Skills
Be prepared to discuss your experience with SIEM tools like MS Sentinel, Alien Vault, or Splunk. Highlight specific instances where you've used these tools in a SOC environment, and be ready to explain your approach to threat hunting and incident response.
✨Demonstrate Communication Skills
Since excellent communication is key for this role, practice articulating complex technical concepts in a clear and concise manner. You might be asked to explain your thought process during an incident response, so ensure you can convey your ideas effectively.
✨Understand the Company Culture
Research the company's values and culture, especially their 'people first' approach. Be ready to discuss how you align with their mission and how you can contribute to a positive team environment, particularly in high-pressure situations.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your problem-solving skills in real-world situations. Think of examples from your past experiences where you successfully managed incidents or conducted threat hunts, and be ready to walk through your decision-making process.