SOC Analyst | Remote Contract | Outside IR35

SOC Analyst | Remote Contract | Outside IR35

Manchester Freelance 36000 - 60000 £ / year (est.) No home office possible
T

At a Glance

  • Tasks: Monitor security alerts and investigate potential threats using advanced tools.
  • Company: Join a dynamic team focused on cybersecurity excellence.
  • Benefits: Enjoy remote work flexibility and a contract outside IR35.
  • Why this job: Be part of a crucial mission to protect digital assets and enhance your skills.
  • Qualifications: Experience in cybersecurity and proficiency with SIEM tools required.
  • Other info: This is a 6-month contract, perfect for those seeking hands-on experience.

The predicted salary is between 36000 - 60000 £ per year.

Our client is looking for two experienced SOC Analysts to join them on a 6-month initial contract, working remotely. This role is operating outside of IR35. Candidates must be based in the UK.

Key Responsibilities:

  • Monitor and investigate security alerts using SIEM tools (e.g., Splunk, Microsoft Sentinel).
  • Conduct threat-hunting activities to proactively identify suspicious behavior and potential threats.
  • Analyze logs and network traffic to identify anomalies.
  • Collaborate with incident response teams to contain and remediate threats.
  • Create and maintain documentation, playbooks, and incident reports.
  • Continuously improve SOC processes and detection capabilities.

What We're Looking For:

  • Strong background in cybersecurity with hands-on SOC experience.
  • Proficiency in threat-hunting methodologies and investigative techniques.
  • Experience with SIEM platforms such as Splunk, Sentinel, or similar.
  • Solid understanding of security frameworks, malware analysis, and network protocols.
  • Strong analytical and problem-solving skills.
  • Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified) are a plus.
T

Contact Detail:

Trilogy International, A Korn Ferry Company Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land SOC Analyst | Remote Contract | Outside IR35

✨Tip Number 1

Familiarise yourself with the specific SIEM tools mentioned in the job description, like Splunk and Microsoft Sentinel. Consider setting up a personal project or lab environment to practice your skills and demonstrate your hands-on experience during interviews.

✨Tip Number 2

Engage with online communities and forums related to SOC analysis and cybersecurity. Networking with professionals in the field can provide valuable insights and potentially lead to referrals for the position.

✨Tip Number 3

Stay updated on the latest cybersecurity threats and trends. Being knowledgeable about current events in the industry will not only help you in interviews but also show your passion for the field.

✨Tip Number 4

Prepare to discuss your previous experiences in threat-hunting and incident response during interviews. Be ready to share specific examples of how you've identified and mitigated threats in past roles.

We think you need these skills to ace SOC Analyst | Remote Contract | Outside IR35

Cybersecurity Knowledge
SIEM Tools Proficiency
Threat-Hunting Methodologies
Incident Response Collaboration
Log Analysis
Network Traffic Analysis
Security Frameworks Understanding
Malware Analysis Skills
Analytical Skills
Problem-Solving Skills
Documentation and Reporting
Continuous Improvement Mindset
Relevant Cybersecurity Certifications

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights your experience in cybersecurity and SOC roles. Emphasise your proficiency with SIEM tools like Splunk or Microsoft Sentinel, and include any relevant certifications.

Craft a Compelling Cover Letter: Write a cover letter that showcases your passion for cybersecurity and your hands-on experience in threat-hunting and incident response. Mention specific examples of how you've successfully identified and remediated threats in previous roles.

Highlight Relevant Skills: In your application, clearly outline your analytical and problem-solving skills. Provide examples of how you've used these skills to improve SOC processes or detection capabilities in past positions.

Proofread Your Application: Before submitting, carefully proofread your application for any spelling or grammatical errors. A polished application reflects your attention to detail, which is crucial in the cybersecurity field.

How to prepare for a job interview at Trilogy International, A Korn Ferry Company

✨Showcase Your Technical Skills

Be prepared to discuss your experience with SIEM tools like Splunk or Microsoft Sentinel. Highlight specific instances where you've successfully monitored and investigated security alerts, as this will demonstrate your hands-on expertise.

✨Demonstrate Threat-Hunting Knowledge

Since the role involves proactive threat-hunting, be ready to explain your methodologies and techniques. Share examples of how you've identified suspicious behaviour in the past and what steps you took to address it.

✨Prepare for Scenario-Based Questions

Expect questions that present hypothetical security incidents. Practice articulating your thought process on how you would analyse logs, collaborate with incident response teams, and remediate threats effectively.

✨Highlight Continuous Improvement Efforts

Discuss any initiatives you've taken to improve SOC processes or detection capabilities. This could include creating documentation, playbooks, or incident reports, showcasing your commitment to enhancing security operations.

SOC Analyst | Remote Contract | Outside IR35
Trilogy International, A Korn Ferry Company
T
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>