L3 SOC Analyst (Reading)
L3 SOC Analyst (Reading)

L3 SOC Analyst (Reading)

London Full-Time 49000 - 84000 £ / year (est.) Home office (partial)
Go Premium
E

At a Glance

  • Tasks: Investigate security threats and mentor junior analysts in a dynamic cyber defence team.
  • Company: Join a leading Cyber Defence Operations team dedicated to global cyber risk management.
  • Benefits: Enjoy a competitive salary, benefits, and flexible remote work options.
  • Why this job: Make a real impact on cyber security while collaborating with global experts.
  • Qualifications: 4+ years in SOC analysis, strong knowledge of security tools, and scripting skills required.
  • Other info: Permanent position based in Reading, with 2 days a week on-site.

The predicted salary is between 49000 - 84000 £ per year.

Join a Leading Cyber Defence Operations Team and help safeguard against global cyber risks!

Salary: £70,000 + Benefits

Location: Reading - 2 Days a week on site

Employment Type: Permanent

The Cyber Defence Operations team is responsible for protecting customers against cyber threats worldwide. The team’s mission is to enhance the global cyber defence posture and reduce cyber risks through operational leadership and capabilities. We’re looking for a Level 3 SOC Analyst to join our client's team, offering expertise in security analysis and incident response to help drive the success of their Cyber Security Operations Center (CSOC).

In this role, you will investigate and validate potential security threats, utilising a range of security tools and products. As a Senior Analyst, you will also work to mentor and uplift analyst skills and act as a key escalation point. The role will involve collaborating with global security teams, including CERT and Incident Management, to enhance overall security capabilities.

Key Responsibilities:

  • Advanced Incident Response: Handle escalated security incidents that L1 and L2 analysts cannot resolve, such as sophisticated malware infections, APTs, and complex intrusions. Lead forensic analysis and threat hunting efforts to ensure rapid containment and recovery.
  • Security Analysis and Root Cause Analysis: Conduct detailed analysis of security events to address current cyber threats. Participate in or lead security event analysis activities.
  • Security Reporting and Advisories: Contribute to or lead the delivery of cyber security reports and advisories to key stakeholders.
  • Residual Risk Assessment: Deliver post-incident analysis, technical lessons learned, and reporting to assess residual risk.
  • Advanced SIEM Tuning: Refine and tune SIEM tools to reduce false positives and detect more sophisticated threats, ensuring optimal alert configurations.
  • Automating Response Actions: Develop and improve SOAR playbooks to automate repetitive tasks and enhance the incident response process.
  • Collaboration: Work closely with onshore teams to fine-tune alert volumes and contribute ideas for operational improvement.
  • Threat Response: Engage in threat hunting from a blue team perspective, identifying potential threat group activity.
  • Mentorship & Leadership: Mentor and encourage team members to create sustainable knowledge bases, playbooks, processes, and procedures.

Key Requirements:

  • 4+ years of experience in SOC analysis, security event analysis, and incident response (Level 2 or above).
  • Extensive hands-on experience in security event analysis and incident response.
  • Deep knowledge of IPv4/IPv6, TCP networking protocols, and the OSI model.
  • Expertise in security tools: SIEM (ArcSight, Sentinel, QRadar, Splunk), EDR (Microsoft Defender, FireEye), IDS/IPS, firewalls, proxies, web application firewalls, and anti-virus technologies.
  • Strong knowledge of Linux and Windows operating systems.
  • Familiarity with SOAR technologies (e.g., IBM Resilient, Splunk Phantom, SIEMplify) and cloud platforms (e.g., AWS, Azure, O365).
  • Experience investigating intrusions in Linux and cloud environments.
  • Proficiency in scripting, regular expression development, and query optimization (e.g., Kusto, SQL).

If you’re ready to step up your career in a dynamic and global environment, apply today to join a growing Cyber Defence Operations team and make an impact on the future of cyber security!

L3 SOC Analyst (Reading) employer: Excelerate

Join a forward-thinking company that prioritises employee growth and development within the dynamic field of cyber security. Located in Reading, our collaborative work culture fosters innovation and mentorship, allowing you to enhance your skills while contributing to global cyber defence efforts. With competitive salaries and comprehensive benefits, we are committed to creating a rewarding environment where you can thrive and make a meaningful impact.
E

Contact Detail:

Excelerate Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land L3 SOC Analyst (Reading)

✨Tip Number 1

Familiarise yourself with the specific security tools mentioned in the job description, such as SIEM and EDR technologies. Having hands-on experience or even a solid understanding of these tools will give you an edge during interviews.

✨Tip Number 2

Showcase your incident response skills by preparing examples of past experiences where you've successfully handled escalated security incidents. Be ready to discuss your approach to threat hunting and forensic analysis.

✨Tip Number 3

Highlight any mentoring or leadership experiences you have, as this role involves uplifting analyst skills. Be prepared to discuss how you've contributed to team knowledge bases or improved processes in previous roles.

✨Tip Number 4

Stay updated on the latest cyber threats and trends in the industry. Being knowledgeable about current events in cybersecurity can help you engage in meaningful discussions during interviews and demonstrate your passion for the field.

We think you need these skills to ace L3 SOC Analyst (Reading)

Advanced Incident Response
Security Event Analysis
Root Cause Analysis
SIEM Tuning
Threat Hunting
Incident Management
Collaboration Skills
Mentorship and Leadership
Knowledge of IPv4/IPv6
TCP Networking Protocols
OSI Model
Experience with Security Tools (ArcSight, Sentinel, QRadar, Splunk)
EDR Technologies (Microsoft Defender, FireEye)
IDS/IPS Knowledge
Firewall and Proxy Configuration
Web Application Firewalls
Anti-Virus Technologies
Linux Operating System Proficiency
Windows Operating System Proficiency
Familiarity with SOAR Technologies
Cloud Platform Knowledge (AWS, Azure, O365)
Scripting Proficiency
Regular Expression Development
Query Optimization (Kusto, SQL)

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights relevant experience in SOC analysis, incident response, and security tools. Use keywords from the job description to demonstrate that you meet the key requirements.

Craft a Compelling Cover Letter: Write a cover letter that showcases your passion for cyber security and your specific skills related to the role. Mention your experience with advanced incident response and any leadership roles you've held.

Showcase Relevant Skills: In your application, emphasise your hands-on experience with SIEM tools, EDR technologies, and your knowledge of networking protocols. Provide examples of how you've successfully handled security incidents in the past.

Prepare for Technical Questions: Anticipate technical questions related to security analysis and incident response. Brush up on your knowledge of threat hunting, forensic analysis, and scripting to ensure you're ready for potential interview scenarios.

How to prepare for a job interview at Excelerate

✨Showcase Your Technical Expertise

Be prepared to discuss your hands-on experience with security tools like SIEM, EDR, and your knowledge of networking protocols. Highlight specific incidents you've handled and the methodologies you used for analysis and response.

✨Demonstrate Problem-Solving Skills

Expect scenario-based questions where you'll need to explain how you would handle complex security incidents. Use examples from your past experience to illustrate your thought process and decision-making skills.

✨Emphasise Collaboration and Mentorship

Since the role involves working closely with global teams and mentoring junior analysts, be ready to discuss your experiences in teamwork and leadership. Share how you've contributed to team success and knowledge sharing.

✨Prepare for Technical Assessments

You may face technical assessments or practical tests during the interview. Brush up on your scripting skills and be ready to demonstrate your ability to analyse security events or tune SIEM configurations effectively.

L3 SOC Analyst (Reading)
Excelerate
Location: London
Go Premium

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

E
  • L3 SOC Analyst (Reading)

    London
    Full-Time
    49000 - 84000 £ / year (est.)
  • E

    Excelerate

    50-100
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>