L3 SOC / Cyber Security Engineer - Threat Hunter / SIEM Sentinel

L3 SOC / Cyber Security Engineer - Threat Hunter / SIEM Sentinel

Full-Time 45000 - 65000 ÂŁ / year (est.) No home office possible
I

At a Glance

  • Tasks: Join a dynamic SOC team to lead cyber incident management and proactive threat hunting.
  • Company: Work for a top IT company known for its cutting-edge technology and exceptional talent.
  • Benefits: Enjoy flexible working, impressive customers, and a supportive 'people first' culture.
  • Why this job: Grow your career with the best training and certifications in a fast-paced cyber environment.
  • Qualifications: 2+ years in a SOC, experience with SIEM tools, and relevant cyber security certifications required.
  • Other info: 4 days on, 4 days off shift pattern; SC clearance eligibility needed.

The predicted salary is between 45000 - 65000 ÂŁ per year.

My client is one of the most recognisable names in IT and has some of the best people in the industry working for them. They’re top partners with all the top Vendors, which means you get to work with the best technology, the best people, the best training, the best certification programmes, and the best environment to grow!

Why?:

  • Work with some of the best cyber consultants in the country.
  • The pathway to do whatever you want in cyber is continuous.
  • “People first” culture.
  • The Latest, cutting-edge technology.

You will join a 24/7 SOC team, involved in the highest level of Incident Response activities, proactive threat hunting, and development of detection and use-case capabilities. You’ll be working alongside the engineering team to help find tuning optimisation opportunities.

Candidates MUST have or be eligible to gain SC clearance upon hire.

Key Skills required:

  • 2+ years’ experience working in a SOC environment – ideally MSSP.
  • Experience in a technical security role is also considered.
  • Experience with SIEM tools, such as MS Sentinel, Alien Vault, or Splunk.
  • A cyber security qualification, certification, or degree e.g. CySA+, CompTIA SEC+, or similar experience. Microsoft SC-200 Certs are desirable.
  • Excellent communication skills.
  • A strong knowledge of sophisticated threat actor methodologies, along with experience in incident response and forensic investigations.

This business has a clear picture of where they want to be, have the right individuals steering the ship, and exceptional tech talent leading the way. Impressive customers, flexible working, and a company that truly cares.

Responsibilities:

  • Leading escalated Cyber Incident Management, including Major Incidents and 2nd/3rd line analysis for ongoing investigations.
  • Carrying out proactive threat hunts, RCAs, creation of detection capabilities.
  • Monitor/hunt security alerts from security platforms (SIEM platforms, such as MS Sentinel, Alien Vault, or Splunk).
  • 4 days on 4 days off – days and nights rota.
  • Act on Second Line security alerts, incidents, requests, and events to ensure that threats, vulnerabilities, and breaches are managed for successful resolution.
  • Document and manage cases to utilise information for customer reports, to provide insightful and intelligent recommendations.
  • Facilitate recovery, following the resolution of incidents.
  • Provide subject matter expertise regarding exploits, threat actors, TTPs, etc.
  • Maintain high quality across SLA’s and KPI’s.

Please hit the button to Apply and/or email Harley.robertson@infraview.co.uk or call on 020 3004 8235 for further info.

L3 SOC / Cyber Security Engineer - Threat Hunter / SIEM Sentinel employer: InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment

As a leading name in IT, our company offers an exceptional work environment where you can thrive as an L3 SOC / Cyber Security Engineer. With a strong 'people first' culture, flexible working arrangements, and access to cutting-edge technology, we prioritise your professional growth through top-tier training and certification programmes. Join us to collaborate with some of the best cyber consultants in the industry, ensuring a rewarding career path in a dynamic and supportive setting.
I

Contact Detail:

InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land L3 SOC / Cyber Security Engineer - Threat Hunter / SIEM Sentinel

✨Tip Number 1

Familiarise yourself with the latest SIEM tools, especially Microsoft Sentinel, as this is a key requirement for the role. Consider setting up a lab environment to practice your skills and demonstrate your hands-on experience during interviews.

✨Tip Number 2

Network with professionals in the cyber security field, particularly those working in SOC environments. Attend industry events or webinars to connect with potential colleagues and learn about their experiences, which can give you valuable insights into the company culture.

✨Tip Number 3

Stay updated on the latest threat actor methodologies and incident response techniques. Follow relevant blogs, podcasts, and forums to ensure you can discuss current trends and challenges in cyber security during your interviews.

✨Tip Number 4

Prepare to showcase your communication skills, as they are essential for this role. Practice explaining complex technical concepts in simple terms, as you may need to convey information to non-technical stakeholders during your work.

We think you need these skills to ace L3 SOC / Cyber Security Engineer - Threat Hunter / SIEM Sentinel

Experience in a SOC environment
Proficiency with SIEM tools (MS Sentinel, Alien Vault, Splunk)
Cyber security qualifications (CySA+, CompTIA SEC+ or similar)
Microsoft SC-200 certification (desirable)
Excellent communication skills
Knowledge of threat actor methodologies
Experience in incident response and forensic investigations
Ability to conduct proactive threat hunts
Root Cause Analysis (RCA) skills
Creation of detection capabilities
Case documentation and management
Subject matter expertise on exploits and TTPs
Ability to manage security alerts and incidents
Understanding of SLA and KPI maintenance

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights relevant experience in a SOC environment, particularly with SIEM tools like MS Sentinel, Alien Vault, or Splunk. Emphasise any cyber security qualifications or certifications you hold, such as CySA+ or CompTIA SEC+.

Craft a Strong Cover Letter: In your cover letter, express your passion for cyber security and detail how your skills align with the responsibilities of the role. Mention your experience in incident response and threat hunting, and how you can contribute to the team.

Showcase Communication Skills: Since excellent communication skills are essential for this role, consider including examples in your application that demonstrate your ability to convey complex information clearly, whether through previous job experiences or projects.

Highlight Continuous Learning: Mention any ongoing training or certifications you are pursuing, especially those related to Microsoft SC-200 or other relevant technologies. This shows your commitment to staying updated in the fast-evolving field of cyber security.

How to prepare for a job interview at InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment

✨Showcase Your Technical Skills

Be prepared to discuss your experience with SIEM tools like MS Sentinel, Alien Vault, or Splunk. Highlight specific instances where you've used these tools in a SOC environment, and be ready to explain your approach to threat hunting and incident response.

✨Demonstrate Communication Skills

Since excellent communication is key for this role, practice articulating complex technical concepts in a clear and concise manner. Be ready to provide examples of how you've effectively communicated with team members or clients during incidents.

✨Understand the Company Culture

Research the company's 'people first' culture and be prepared to discuss how you align with their values. Share experiences that demonstrate your ability to work collaboratively and contribute positively to a team environment.

✨Prepare for Scenario-Based Questions

Expect scenario-based questions related to incident management and threat hunting. Think through past experiences where you led investigations or responded to major incidents, and be ready to explain your thought process and decision-making.

L3 SOC / Cyber Security Engineer - Threat Hunter / SIEM Sentinel
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
I
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>