At a Glance
- Tasks: Join our team as a SOC Analyst Level 2, monitoring and investigating security incidents.
- Company: NTT DATA is a leading global security services provider with a focus on innovation and teamwork.
- Benefits: Enjoy flexible work options, continuous learning opportunities, and a supportive work environment.
- Why this job: Be part of a dynamic team shaping the future of cybersecurity while making a real impact.
- Qualifications: 3-5 years in IT security, knowledge of SIEM tools, and strong analytical skills required.
- Other info: This role involves 24/7 operations with shift patterns of 4 days on, 4 days off.
The predicted salary is between 36000 - 60000 ยฃ per year.
Overview
NTT DATA Birmingham, United Kingdom is recruiting for a Senior Associate level Managed Detection and Response SOC Analyst Level 2 to join our Security Operations Centre. This role is on-site in Birmingham and involves 24/7 operations, likely in a shift pattern of 4 days on, 4 days off.
About Us
NTT DATA is one of the worldโs largest Global Security services providers with over 7500 Security SMEs and integration partners to many of the worldโs most recognised Security Technology providers. We strive to hire exceptional, innovative, and passionate individuals who want to grow with us. We work with our people, clients and communities to enable them to fulfil their potential and to do great things. We believe that by bringing everyone together, we can solve problems using innovative technology that creates a sustainable and secure world.
What you will be doing
- The primary function of the SOC Analyst (L2) is to analyse incidents escalated by the SOC Analyst (L1) and undertake detailed investigation of security events, determining whether an event will be classified as an incident.
- Coordinate with the customer IT and security teams for resolution of security incidents.
Main Duties
- Security Monitoring and Investigation: monitor SIEM tools to deliver high-quality security operations, oversee and enhance monitoring systems to detect and analyse potential security incidents.
- Conduct real-time analysis of security events and incidents and escalate as necessary.
- Support other teams on investigations, determine root cause and impact.
- Document findings and lessons learned to improve incident response procedures.
- Ensure runbooks are followed and fit for purpose.
- Lead and coordinate incident response activities to contain, eradicate, and recover from security incidents.
- Develop and maintain incident response plans aligned with industry best practices.
- Manage escalation in the event of security incidents and follow major incident processes.
- Stay abreast of latest cybersecurity threats and vulnerabilities, integrating threat intelligence into monitoring processes.
- Contribute to threat intelligence feeds to enhance proactive detection.
- Security Tool Management: manage and optimise SIEM tools, ensure proper configuration and updates; own the development and implementation of SOC use cases.
- Evaluate new security technologies and recommend enhancements.
- Collaborate with cross-functional teams to address security incidents and implement preventive measures.
- Provide expertise and guidance to other analysts; ensure new/changed services are monitored.
- Documentation: maintain up-to-date documentation of security procedures, incident response plans, and analysis reports; create post-incident reports for management and stakeholders; support monthly reporting packs as per contractual requirements; create and document robust event and incident management processes, runbooks and playbooks.
- Other responsibilities: involvement in scoping and standing up new solutions; assist Pre-Sales with requirements; demonstrate SOC tools to clients; continual service improvement with recommendations for changes to address incidents.
What you will bring
- Must be able to work on-site in Birmingham with 24/7 operations (4 days on, 4 days off).
- Must be able to obtain SC Clearance or already hold SC clearance.
- Strong understanding of Incident Response approaches.
- Ideally knowledge and hands-on experience with Splunk or QRadar.
- Strong interpersonal and presentation skills; strong analytical skills.
- Good understanding of network traffic flows and ability to identify normal vs. suspicious activity.
- Good understanding of Vulnerability Scanning and management as well as Ethical Hacking (Penetration Testing).
- Ability to learn forensic techniques and reverse engineer attacks to understand actions taken.
- Knowledge of ITIL disciplines (Incident, Problem, Change Management).
- Ability to work with minimal supervision; willingness to work in a 24/7 or on-call environment.
Education Requirements & Experience
- Minimum 3โ5 years of experience in IT security, preferably in a SOC/NOC environment.
- Cyber Security Certifications preferred (e.g., GIAC, ISC2, SC-200).
- Experience with Cloud platforms (AWS and/or Microsoft Azure).
- Excellent knowledge of Microsoft Office products, especially Excel and Word.
Reports to
- Security Director โ NTT DATA UK Security Practice
- Client Delivery Director โ NTT DATA UK Managed Services
We are an equal opportunities employer and are committed to promoting equity and diversity. We also recognise the Disability Confident scheme and guarantee an interview to applicants who declare a disability and meet the minimum requirements. If you require reasonable adjustments during the recruitment process, please let us know.
#J-18808-Ljbffr
Soc Analyst Level 2 employer: NTT DATA
Contact Detail:
NTT DATA Recruiting Team
StudySmarter Expert Advice ๐คซ
We think this is how you could land Soc Analyst Level 2
โจTip Number 1
Familiarise yourself with the specific SIEM tools mentioned in the job description, especially Microsoft Sentinel. Having hands-on experience or even a solid understanding of how to configure and optimise these tools will set you apart from other candidates.
โจTip Number 2
Stay updated on the latest cybersecurity threats and trends. Being able to discuss recent incidents or vulnerabilities during your interview will demonstrate your proactive approach and genuine interest in the field.
โจTip Number 3
Prepare to showcase your analytical skills by discussing past experiences where you've successfully identified and resolved security incidents. Use specific examples that highlight your problem-solving abilities and teamwork in high-pressure situations.
โจTip Number 4
Network with current or former employees of NTT DATA, if possible. Engaging with them can provide valuable insights into the company culture and expectations, which you can leverage during your application process.
We think you need these skills to ace Soc Analyst Level 2
Some tips for your application ๐ซก
Tailor Your CV: Make sure your CV highlights relevant experience in IT security, particularly in SOC/NOC environments. Emphasise your knowledge of incident response, SIEM tools like Microsoft Sentinel, and any cybersecurity certifications you hold.
Craft a Strong Cover Letter: In your cover letter, express your passion for cybersecurity and detail how your skills align with the responsibilities outlined in the job description. Mention specific experiences that demonstrate your analytical skills and ability to work under pressure.
Showcase Relevant Skills: Clearly list your technical skills related to security monitoring, incident response, and vulnerability management. Highlight your understanding of network traffic flows and any hands-on experience with ethical hacking or penetration testing.
Prepare for Potential Questions: Anticipate questions related to your experience with security incidents and your approach to incident response. Be ready to discuss how you stay updated on the latest cybersecurity threats and how you would handle specific scenarios.
How to prepare for a job interview at NTT DATA
โจUnderstand the Role
Make sure you have a solid grasp of what a SOC Analyst Level 2 does. Familiarise yourself with the key responsibilities, such as incident analysis and security monitoring. This will help you answer questions confidently and demonstrate your knowledge.
โจShowcase Your Technical Skills
Be prepared to discuss your hands-on experience with SIEM tools like Microsoft Sentinel. Highlight any relevant certifications or training you've completed, and be ready to explain how you've used these tools in past roles to manage security incidents.
โจPrepare for Scenario-Based Questions
Expect to face scenario-based questions that assess your problem-solving skills in real-time situations. Think about past incidents you've handled and be ready to walk the interviewer through your thought process and actions taken during those events.
โจDemonstrate Team Collaboration
Since this role involves working closely with IT and Security teams, be ready to discuss your experience collaborating with others. Share examples of how you've worked in a team to resolve security incidents or improve processes, showcasing your interpersonal skills.