At a Glance
- Tasks: Investigate security threats and mentor junior analysts in a dynamic cyber defence team.
- Company: Join a leading Cyber Defence Operations team dedicated to global cybersecurity.
- Benefits: Enjoy a competitive salary, remote work options, and opportunities for professional growth.
- Why this job: Make a real impact on global cyber security while working with cutting-edge technology.
- Qualifications: 4+ years in SOC analysis with expertise in security tools and incident response required.
- Other info: Work 2 days a week on-site in Reading and collaborate with global security teams.
The predicted salary is between 42000 - 84000 £ per year.
Join a Leading Cyber Defence Operations Team and help safeguard against global cyber risks!
Location: Reading - 2 Days a week on site
Employment Type: Permanent
The Cyber Defence Operations team is responsible for protecting customers against cyber threats worldwide. The team’s mission is to enhance the global cyber defence posture and reduce cyber risks through operational leadership and capabilities. We’re looking for a Level 3 SOC Analyst to join our client's team, offering expertise in security analysis and incident response to help drive the success of their Cyber Security Operations Center (CSOC).
In this role, you will investigate and validate potential security threats, utilising a range of security tools and products. As a Senior Analyst, you will also work to mentor and uplift analyst skills and act as a key escalation point. The role will involve collaborating with global security teams, including CERT and Incident Management, to enhance overall security capabilities.
Key Responsibilities:
- Advanced Incident Response: Handle escalated security incidents that L1 and L2 analysts cannot resolve, such as sophisticated malware infections, APTs, and complex intrusions. Lead forensic analysis and threat hunting efforts to ensure rapid containment and recovery.
- Security Analysis and Root Cause Analysis: Conduct detailed analysis of security events to address current cyber threats. Participate in or lead security event analysis activities.
- Security Reporting and Advisories: Contribute to or lead the delivery of cyber security reports and advisories to key stakeholders.
- Residual Risk Assessment: Deliver post-incident analysis, technical lessons learned, and reporting to assess residual risk.
- Advanced SIEM Tuning: Refine and tune SIEM tools to reduce false positives and detect more sophisticated threats, ensuring optimal alert configurations.
- Automating Response Actions: Develop and improve SOAR playbooks to automate repetitive tasks and enhance the incident response process.
- Collaboration: Work closely with onshore teams to fine-tune alert volumes and contribute ideas for operational improvement.
- Threat Response: Engage in threat hunting from a blue team perspective, identifying potential threat group activity.
- Mentorship & Leadership: Mentor and encourage team members to create sustainable knowledge bases, playbooks, processes, and procedures.
Key Requirements:
- 4+ years of experience in SOC analysis, security event analysis, and incident response (Level 2 or above).
- Extensive hands-on experience in security event analysis and incident response.
- Deep knowledge of IPv4/IPv6, TCP networking protocols, and the OSI model.
- Expertise in security tools: SIEM (ArcSight, Sentinel, QRadar, Splunk), EDR (Microsoft Defender, FireEye), IDS/IPS, firewalls, proxies, web application firewalls, and anti-virus technologies.
- Strong knowledge of Linux and Windows operating systems.
- Familiarity with SOAR technologies (e.g., IBM Resilient, Splunk Phantom, SIEMplify) and cloud platforms (e.g., AWS, Azure, O365).
- Experience investigating intrusions in Linux and cloud environments.
- Proficiency in scripting, regular expression development, and query optimization (e.g., Kusto, SQL).
If you’re ready to step up your career in a dynamic and global environment, apply today to join a growing Cyber Defence Operations team and make an impact on the future of cyber security!
L3 SOC Analyst employer: Excelerate
Contact Detail:
Excelerate Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land L3 SOC Analyst
✨Tip Number 1
Familiarise yourself with the specific security tools mentioned in the job description, such as SIEM and EDR technologies. Having hands-on experience or even personal projects showcasing your skills with these tools can set you apart during interviews.
✨Tip Number 2
Stay updated on the latest cyber threats and trends in the industry. Being able to discuss recent incidents or emerging threats during your interview will demonstrate your passion and commitment to the field of cyber security.
✨Tip Number 3
Network with professionals in the cyber security field, especially those working in SOC roles. Engaging in forums, attending webinars, or joining local meetups can provide valuable insights and potentially lead to referrals for the position.
✨Tip Number 4
Prepare to discuss your experience in mentoring and leading teams, as this role requires strong leadership skills. Think of examples where you've successfully guided others or improved team processes, as this will highlight your suitability for the position.
We think you need these skills to ace L3 SOC Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in SOC analysis, incident response, and security tools. Use keywords from the job description to demonstrate that you meet the key requirements.
Craft a Compelling Cover Letter: Write a cover letter that showcases your passion for cyber security and your specific skills related to the role. Mention your experience with advanced incident response and any mentoring roles you've held.
Showcase Technical Skills: In your application, emphasise your hands-on experience with security tools like SIEM and EDR, as well as your knowledge of networking protocols and operating systems. Provide examples of how you've used these skills in past roles.
Highlight Collaboration Experience: Since the role involves working closely with global security teams, include examples of past collaborations. Discuss how you contributed to team success and improved operational processes.
How to prepare for a job interview at Excelerate
✨Showcase Your Technical Expertise
Be prepared to discuss your hands-on experience with security tools like SIEM, EDR, and IDS/IPS. Highlight specific incidents you've managed and the techniques you used for analysis and response.
✨Demonstrate Problem-Solving Skills
Expect scenario-based questions where you'll need to explain how you would handle complex security incidents. Use examples from your past experiences to illustrate your thought process and decision-making.
✨Emphasise Collaboration and Mentorship
Since the role involves working closely with global teams and mentoring junior analysts, be ready to discuss your experience in team settings. Share examples of how you've contributed to team success and supported others in their development.
✨Stay Updated on Cyber Threats
Research current cyber threats and trends before the interview. Being knowledgeable about recent incidents or vulnerabilities will demonstrate your passion for the field and your commitment to staying informed.