Job Description
SOC Analyst
A Global Organisation requires a Contract L2 SOC Analyst to join their Incident Response team – Splunk, Defender
- Day Rate: £400 – £420pd
- IR35 Status: Inside
- Duration: 6 months initially
- Travel: 2 days a week in Berkshire
-
This L2 SOC Analyst will have the previous following experience:
- Monitor and investigate security alerts using tools such as Splunk, Microsoft Defender, and CrowdStrike, escalating incidents as needed and ensuring timely resolution.
- Leverage Microsoft Co-pilot and automation workflows to streamline threat detection, incident triage, and response processes.
- Conduct in-depth log analysis and correlation across multiple data sources to identify potential security threats and reduce false positives.
- Support threat hunting and root cause analysis efforts, providing detailed documentation and recommendations based on findings.
- Collaborate with L1 analysts, engineering teams, and threat intelligence functions to enhance detection capabilities and improve overall SOC effectiveness.
Contact Detail:
La Fosse Recruiting Team