L2 & L3 SOC / Cyber Security Engineer - Threat Hunter / SIEM Sentinel
L2 & L3 SOC / Cyber Security Engineer - Threat Hunter / SIEM Sentinel

L2 & L3 SOC / Cyber Security Engineer - Threat Hunter / SIEM Sentinel

Full-Time 36000 - 52000 ÂŁ / year (est.) No home office possible
I

At a Glance

  • Tasks: Join a dynamic SOC team to tackle cyber threats and enhance security measures.
  • Company: Work for a leading IT firm known for its top-tier technology and talent.
  • Benefits: Enjoy flexible working, impressive training, and a supportive 'people first' culture.
  • Why this job: Gain hands-on experience with cutting-edge tech and grow your career in cybersecurity.
  • Qualifications: 2+ years in a SOC environment; SIEM experience and relevant certifications are essential.
  • Other info: Opportunity for SC clearance and a chance to work with industry experts.

The predicted salary is between 36000 - 52000 ÂŁ per year.

My client is one of the most recognisable names in IT and has some of the best people in the industry working for them. They are top partners with all the top vendors, which means you get to work with the best technology, the best people, the best training, the best certification programmes, and the best environment to grow!

Why?

  • Work with some of the best cyber consultants in the country.
  • The pathway to do whatever you want in cyber is continuous.
  • “People first” culture
  • The latest, cutting-edge technology

You will join a 24/7 SOC team, involved in the highest level of Incident Response activities, proactive threat hunting, and development of detection and use-case capabilities. You’ll be working alongside the engineering team to help find tuning optimisation opportunities.

Candidates MUST have or be eligible to gain SC clearance upon hire.

Key Skills required:

  • 2+ years’ experience working in a SOC environment – ideally MSSP. Experience in a technical security role is also considered.
  • Experience with SIEM tools, such as MS Sentinel, Alien Vault, or Splunk.
  • A cyber security qualification, certification, or degree e.g. CySA+, CompTIA SEC+, or similar experience. Microsoft SC-200 Certs are desirable.
  • Excellent communication skills.
  • A strong knowledge of sophisticated threat actor methodologies, along with experience in incident response and forensic investigations.

This business has a clear picture of where they want to be, have the right individuals steering the ship, and exceptional tech talent leading the way. Impressive customers, flexible working, and a company that truly cares.

Responsibilities:

  • Leading escalated Cyber Incident Management, including Major Incidents and 2nd/3rd line analysis for ongoing investigations.
  • Carrying out proactive threat hunts, RCAs, creation of detection capabilities.
  • Monitor/hunt security alerts from security platforms (SIEM platforms, such as MS Sentinel, Alien Vault, or Splunk).
  • 4 days on - 4 days off - Days and Nights.
  • Act on Second Line security alerts, incidents, requests, and events to ensure that threats, vulnerabilities, and breaches are managed for successful resolution.
  • Document and manage cases to utilise information for customer reports, to provide insightful and intelligent recommendations.
  • Facilitate recovery, following the resolution of incidents.
  • Provide subject matter expertise regarding exploits, threat actors, TTPs, etc.
  • Maintain high quality across SLA’s and KPI’s.

Please hit the button to Apply and/or email Harley.robertson@infraview.co.uk or call on 020 3004 8235 for further info.

L2 & L3 SOC / Cyber Security Engineer - Threat Hunter / SIEM Sentinel employer: InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment

As a leading name in the IT sector, our company offers an exceptional work environment that prioritises a 'people first' culture, ensuring that employees feel valued and supported. With access to cutting-edge technology and top-tier training programmes, you will have ample opportunities for professional growth and development while collaborating with some of the best cyber consultants in the industry. Our flexible working arrangements, including a hybrid model, allow for a balanced work-life experience, making us an attractive employer for those seeking meaningful and rewarding careers in cyber security.
I

Contact Detail:

InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land L2 & L3 SOC / Cyber Security Engineer - Threat Hunter / SIEM Sentinel

✨Tip Number 1

Familiarise yourself with the specific SIEM tools mentioned in the job description, such as MS Sentinel, Alien Vault, or Splunk. Having hands-on experience or even a project showcasing your skills with these tools can set you apart from other candidates.

✨Tip Number 2

Network with professionals already working in SOC environments or those who have experience with threat hunting. Engaging in relevant online forums or attending cybersecurity meetups can help you gain insights and potentially valuable referrals.

✨Tip Number 3

Stay updated on the latest trends and methodologies in cyber threats and incident response. Following industry leaders on social media or subscribing to cybersecurity newsletters can provide you with current knowledge that may impress during interviews.

✨Tip Number 4

Prepare to discuss your previous experiences in detail, especially any incidents you've managed or threat hunts you've conducted. Be ready to explain your thought process and the outcomes, as this will demonstrate your practical knowledge and problem-solving skills.

We think you need these skills to ace L2 & L3 SOC / Cyber Security Engineer - Threat Hunter / SIEM Sentinel

Experience in a SOC environment
Proficiency with SIEM tools (MS Sentinel, Alien Vault, Splunk)
Cyber security qualifications (CySA+, CompTIA SEC+, or similar)
Microsoft SC-200 certification (desirable)
Excellent communication skills
Knowledge of threat actor methodologies
Experience in incident response and forensic investigations
Proactive threat hunting skills
Root Cause Analysis (RCA) capabilities
Ability to document and manage cases effectively
Understanding of exploits, threat actors, TTPs
Ability to maintain high quality across SLAs and KPIs
Team collaboration skills
Adaptability to shift work

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights relevant experience in SOC environments and technical security roles. Emphasise your familiarity with SIEM tools like MS Sentinel, Alien Vault, or Splunk, as well as any cyber security qualifications you possess.

Craft a Compelling Cover Letter: Write a cover letter that showcases your passion for cyber security and your understanding of the role. Mention specific experiences that demonstrate your skills in incident response, threat hunting, and communication.

Highlight Key Skills: In your application, clearly outline your key skills such as incident management, proactive threat hunting, and knowledge of threat actor methodologies. Use examples to illustrate how you've applied these skills in previous roles.

Proofread Your Application: Before submitting, carefully proofread your application for any spelling or grammatical errors. A polished application reflects your attention to detail, which is crucial in the field of cyber security.

How to prepare for a job interview at InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment

✨Showcase Your Technical Skills

Be prepared to discuss your experience with SIEM tools like MS Sentinel, Alien Vault, or Splunk. Highlight specific instances where you've used these tools in a SOC environment, and be ready to explain your approach to threat hunting and incident response.

✨Demonstrate Communication Skills

Excellent communication is key in this role. Practice articulating complex technical concepts in a clear and concise manner. You may be asked to explain your thought process during an incident response, so ensure you can convey your ideas effectively.

✨Understand the Company Culture

Research the company's 'people first' culture and their commitment to continuous growth. Be ready to discuss how you align with these values and how you can contribute to a positive team environment.

✨Prepare for Scenario-Based Questions

Expect scenario-based questions that assess your problem-solving skills in real-world situations. Think of examples from your past experiences where you successfully managed incidents or conducted threat hunts, and be ready to walk the interviewer through your decision-making process.

L2 & L3 SOC / Cyber Security Engineer - Threat Hunter / SIEM Sentinel
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
I
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>