At a Glance
- Tasks: Monitor and investigate security incidents while leading a dynamic SOC team.
- Company: Join Sopra Steria, a leader in digital solutions for Defence and Security.
- Benefits: Enjoy 25 days annual leave, health cash plan, life assurance, and flexible benefits.
- Why this job: Be part of impactful work in National Security with opportunities for growth and development.
- Qualifications: Experience in a SOC, knowledge of Microsoft Sentinel or Splunk, and networking principles required.
- Other info: Eligible for DV Clearance; based in Farnborough or Hemel Hempstead with shift patterns.
The predicted salary is between 48000 - 72000 £ per year.
Are you in a Security Operations Centre and every day is the same? We can assure you that there is no boredom in our role. We have a growing Cyber practice in our Defence sector and support enterprise scale clients. Now we have opportunities for L2 SOC Analysts to join in our success and work with multiple, high profile clients. You must have proven experience working in a busy SOC with a tech-first approach and be able to lead from the front.
From a technical perspective we are using Microsoft Sentinel, Splunk and MISP Threat sharing so any knowledge of these technologies would be a substantial benefit. This role is based out of our head office in Farnborough OR Hemel Hempstead and will work on a shift pattern with 12 hour shifts (Nights and Days). You do need to be eligible for DV Clearance.
We can offer great career progression opportunities, benefits which you can flex to meet your needs and training and development opportunities.
What you will be doing:
- Monitor, triage, and investigate security incidents on critical client infrastructure.
- In-depth analysis of network traffic, logs, and system events to identify potential security threats and vulnerabilities.
- Provide Incident Response support.
- Maintain, improve and develop team knowledge of SOC tools, security operations and triage.
- Prepare reports for managed clients to both technical and non-technical audiences and continuously improve their content and presentation.
- Maintain and update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies.
What you will bring:
- Experience in Security Operations Centre.
- Demonstrable experience of Managing Microsoft Sentinel or Splunk implementations.
- Knowledge and experience with Mitre Att&ck Framework.
- Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products.
- Deep technical knowledge in the analysis of log data and intrusion detection systems.
- Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP.
It would be great if you had:
- Understanding of static malware analysis and reverse engineering.
- CREST Practitioner Intrusion Analyst.
- Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated.
If you are interested in this role but not sure if your skills and experience are exactly what we’re looking for, please do apply, we’d love to hear from you!
Benefits: 25 days annual leave with the choice to buy additional days, health cash plan, life assurance, pension, and generous flexible benefits fund.
Sopra Steria’s Aerospace, Defence and Security business designs, develops and deploys digital solutions to Central Government clients. The work we do makes a real difference to the client’s goal of National Security, and we operate in a unique and privileged environment. We are given time for professional development activities, and we coach and mentor our colleagues, sharing knowledge and learning from each other. We foster a culture in which employees feel valued and supported and have pride in their work for the customer, delivering outstanding rates of customer satisfaction in the UK’s most complex safety- and security-critical markets.
Contact Detail:
Sopra Steria Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior SOC Analyst
✨Tip Number 1
Familiarise yourself with Microsoft Sentinel and Splunk, as these are key technologies used in the role. Consider taking online courses or certifications to deepen your understanding and demonstrate your commitment to mastering these tools.
✨Tip Number 2
Network with professionals already working in SOC roles or within our company. Attend industry events or join relevant online forums to gain insights and potentially get referrals that could help you stand out during the hiring process.
✨Tip Number 3
Brush up on your knowledge of the Mitre Att&ck Framework and incident response strategies. Being able to discuss specific examples of how you've applied this knowledge in past roles can significantly enhance your candidacy.
✨Tip Number 4
Prepare to discuss your experience with security incident documentation and reporting. Highlight any instances where your reports have led to improved security measures or client satisfaction, as this will showcase your impact in previous roles.
We think you need these skills to ace Senior SOC Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience in Security Operations Centres, particularly with Microsoft Sentinel and Splunk. Use specific examples of your achievements and responsibilities that align with the job description.
Craft a Compelling Cover Letter: Write a cover letter that showcases your passion for cybersecurity and your ability to lead in a SOC environment. Mention your familiarity with the technologies listed in the job description and how you can contribute to the team.
Highlight Relevant Skills: In your application, emphasise your technical skills related to incident response, log analysis, and network security. Be sure to mention any certifications or training that are relevant to the role.
Show Enthusiasm for Continuous Learning: Express your eagerness to engage in training and development opportunities. Mention any past experiences where you have taken the initiative to learn new skills or improve your knowledge in cybersecurity.
How to prepare for a job interview at Sopra Steria
✨Showcase Your Technical Skills
Make sure to highlight your experience with Microsoft Sentinel, Splunk, and MISP Threat sharing during the interview. Be prepared to discuss specific instances where you've used these tools to monitor or respond to security incidents.
✨Understand the Role of a SOC Analyst
Familiarise yourself with the daily responsibilities of a Senior SOC Analyst. Be ready to explain how you would approach monitoring, triaging, and investigating security incidents, as well as how you would improve team knowledge of SOC tools.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your problem-solving skills in real-time situations. Think about past experiences where you successfully identified and mitigated security threats, and be ready to share those stories.
✨Demonstrate Your Communication Skills
Since you'll need to prepare reports for both technical and non-technical audiences, practice explaining complex security concepts in simple terms. This will show your ability to communicate effectively with diverse stakeholders.