SOC Analyst

SOC Analyst

Stevenage Freelance 68000 - 85000 £ / year (est.) No home office possible
C

At a Glance

  • Tasks: Join our SOC team to monitor and analyse cyber threats 24/7.
  • Company: Be part of a world-class defence organisation in Stevenage, Hertfordshire.
  • Benefits: Earn £85 per hour with overtime options and flexible shift patterns.
  • Why this job: Make a real impact in cybersecurity while working with cutting-edge technologies.
  • Qualifications: Background in Cyber Security or related fields is essential.
  • Other info: Initial SC clearance required; DV clearance needed later.

The predicted salary is between 68000 - 85000 £ per year.

Job Description

World Class Defence Organisation based in Stevenage, Hertfordshire is currently looking to recruit 10x SOC Threat Detection Analyst subcontractors on an initial 12 month contract.  This role can start on an SC Security Clearance basis, however DV Clearance will be required down the line. This role would suit someone from a Cyber Security Analyst, SOC Analyst or Threat Detection Analyst background.Hourly Rate: £85 per hour.  Overtime rate of time and a quarter.Contract Duration: 6 MonthsShift pattern: 28 day CycleSat to Tue – Earlies 0400-1200Wed to Sun – OffMon to Fri – Lates 1200-2000Sat to Tue OffWed to Sun – Nights 2000-0400(The type of shift rotates along the pattern through, so the start of the next 28 day cycle they start with lates -> Nights -> earlies then next cycle: Nights -> earlies -> lates)28 days = 4 weeks, 14 days worked per 28 days, 3.5 days worked per week, 3.5 x 8 = 28 hours per weekInitially may not be expected to do nights until team grows.SOC Analyst Job Description:An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The successful applicant will drive a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24×7 SOC.  To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure / Information Systems).It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security platforms including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture platform, Anti Malicious Code, Threat Detection technologies and platforms across the UK Network Perimeter working with the best standard technologies.The SOC Analyst reports to the SOC Manager. The SOC Analyst conducts a range of analysis and assists the incident response team with investigations that need to be escalated to an embedded member of staff. The SOC Analyst key responsibilities are:
  • Effective Tier 1 to 2 alert triage of security events
  • Monitoring of Cyber Security tools
  • Monitoring the SOC email notification mailboxes
  • Assists with the maintenance of Security technologies
  • Assisting the SOC Solutions Lead with project activity
  • Assist proactive threat hunting in collaboration with the CTI function
  • Assist IR in HR and InfoSec related investigations
  • Ensure the timely triage and remediation of any incident or request tickets raised to the SOC
  • Participate in the activity of adding/removing URLs from the AcceptList and BlockList
  • Attend routine security meetings
  • Conduct activities in line with SOC Maturity and continuous improvement

Skillset/experience required (Baseline):

  • A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications.
  • Knowledge of IT Security standard methodologies.
  • Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S.
  • Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools.
  • Hands on experience with IDS/IPS technologies and threat hunting activities.
  • Strong analytical experience and mind-set.
  • Experience within Defensive Cyber-attack methodologies and frameworks.
  • Understanding of Malware capabilities, attack vectors, propagation and impact.
  • Good communication skills liaising with the business and suppliers.

Desirable Skillset/experience (Senior grade):

  • Root cause analysis and leading T2 incident investigations
  • Process / Playbook / Runbook development
  • Working knowledge of detection engineering, false positive improvements
  • Capability to tune SIEM rules or create custom detections
  • Scripted automation experience e.g. Python, SOAR, PowerShell
  • Threat modelling and Hunting methodologies

SOC Analyst employer: Certain Advantage

Join a world-class defence organisation in Stevenage, where you will be part of a dynamic team dedicated to countering cyber threats. With competitive hourly rates and opportunities for overtime, this role offers a supportive work culture that prioritises employee growth through continuous learning and collaboration with industry-leading technologies. Embrace the chance to enhance your skills in a cutting-edge environment while contributing to national security.
C

Contact Detail:

Certain Advantage Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land SOC Analyst

✨Tip Number 1

Familiarise yourself with the specific tools and technologies mentioned in the job description, such as SIEM and Network Packet Capture platforms. Having hands-on experience or even a solid understanding of these tools can set you apart during interviews.

✨Tip Number 2

Network with professionals already working in SOC roles or similar positions. Engaging with them on platforms like LinkedIn can provide insights into the role and may even lead to referrals, which can significantly boost your chances of landing the job.

✨Tip Number 3

Stay updated on the latest trends and threats in cyber security. Being able to discuss current events or recent breaches during your interview will demonstrate your passion for the field and your proactive approach to threat detection.

✨Tip Number 4

Prepare to discuss your analytical skills and past experiences in detail. Be ready to share specific examples of how you've handled security incidents or contributed to threat hunting activities, as this will showcase your practical knowledge and problem-solving abilities.

We think you need these skills to ace SOC Analyst

Cyber Security Knowledge
Network Security Expertise
Operating Systems & Applications Understanding
Security Information Event Monitoring Tools Experience
Network Packet Capture Tools Proficiency
Intrusion Detection/Prevention Systems (IDS/IPS) Experience
Threat Hunting Skills
Analytical Skills
Defensive Cyber-Attack Methodologies Knowledge
Malware Analysis and Understanding
Communication Skills
Root Cause Analysis
Incident Investigation Skills
Process/Playbook/Runbook Development
SIEM Rule Tuning or Custom Detection Creation
Scripting Skills (Python, SOAR, PowerShell)
Threat Modelling and Hunting Methodologies

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights relevant experience in cyber security, particularly in SOC analysis and threat detection. Use keywords from the job description to demonstrate your fit for the role.

Craft a Strong Cover Letter: Write a cover letter that showcases your passion for cyber security and your understanding of the SOC Analyst role. Mention specific skills and experiences that align with the responsibilities outlined in the job description.

Highlight Relevant Skills: In your application, emphasise your knowledge of security tools, incident response, and threat hunting methodologies. Provide examples of how you've applied these skills in previous roles.

Proofread Your Application: Before submitting, carefully proofread your CV and cover letter for any spelling or grammatical errors. A polished application reflects your attention to detail, which is crucial in the field of cyber security.

How to prepare for a job interview at Certain Advantage

✨Showcase Your Cyber Security Knowledge

Make sure to brush up on your understanding of cyber security principles, especially those related to network security and incident response. Be prepared to discuss specific tools and methodologies you've used in previous roles.

✨Demonstrate Analytical Skills

As a SOC Analyst, strong analytical skills are crucial. Prepare examples of how you've successfully triaged alerts or conducted investigations in the past. Highlight your problem-solving abilities and how you approach complex security issues.

✨Familiarise Yourself with the Shift Patterns

Understand the shift patterns mentioned in the job description. Being aware of the rotating shifts will show your flexibility and willingness to adapt to the team's needs, which is essential for a role in a 24x7 SOC environment.

✨Prepare Questions for the Interviewers

Have a few insightful questions ready to ask the interviewers about the SOC's current challenges or the technologies they use. This shows your genuine interest in the role and helps you assess if the position aligns with your career goals.

C
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>