At a Glance
- Tasks: Lead incident response and manage security investigations in a dynamic SOC environment.
- Company: Join NTT DATA, a global leader in security services with a commitment to innovation and growth.
- Benefits: Enjoy flexible work options, continuous learning opportunities, and a supportive, inclusive workplace culture.
- Why this job: Be at the forefront of cybersecurity, making a real impact while collaborating with passionate professionals.
- Qualifications: 3-5 years in IT security, strong analytical skills, and knowledge of SIEM tools required.
- Other info: SC clearance is necessary; embrace a role that supports diversity and inclusion.
The predicted salary is between 36000 - 60000 Β£ per year.
We\βre a business with a global reach that empowers local teams, and we undertake hugely exciting work that is genuinely changing the world. Our advanced portfolio of consulting, applications, business process, cloud, and infrastructure services will allow you to achieve great things by working with brilliant colleagues, and clients, on exciting projects.
Our inclusive work environment prioritises mutual respect, accountability, and continuous learning for all our people. This approach fosters collaboration, well-being, growth, and agility, leading to a more diverse, innovative, and competitive organisation. We are also proud to share that we have a range of Inclusion Networks such as: the Women\βs Business Network, Cultural and Ethnicity Network, LGBTQ+ & Allies Network, Neurodiversity Network and the Parent Network.
For more information on Diversity, Equity and Inclusion please click here: Creating Inclusion Together at NTT DATA UK | NTT DATA
What you\βll be doing;
Profile
- The primary function of the Senior Incident Responder β SOC Analyst is to manage any incidents escalated by the SOC Analyst (L1 & L2) and undertake the detailed investigation of the Security Event. They will able to look at all the evidence available and support the client on the appropriate action to contain and remediate any security incident. They will need to be able to provide root cause analysis and liaise with the customer and the Service Delivery Manager as well and ensuring the actions of the SOC Analysts follow best practice.
Job Duties
- Security Monitoring: & Investigation:
- Monitoring SIEM tools to assure high a level of security operations delivery function
- Oversee and enhance security monitoring systems to detect and analyse potential security incidents.
- Conduct real-time analysis of security events and incident and escalate as necessary
- Support investigations into incidents, determining the root cause and impact.
- Document findings and lessons learned to improve incident response procedures.
- Ensure runbooks are followed and are fit for purpose
- Incident Response:
- Perform static and dynamic malware analysis to determine behaviour, indicators of compromise (IOCs), and potential impact.
- Reverse engineer malware samples to understand functionality and develop detection signatures.
- Ensure chain-of-custody procedures are followed during evidence handling and documentation.
- Lead and coordinate incident response activities to effectively contain, eradicate, and recover from security incidents.
- Escalation management in the event of a security incident
- Manage and support technical handover to Forensics, and law enforcement teams.
- Threat Intelligence:
- Stay abreast of the latest cybersecurity threats and vulnerabilities, integrating threat intelligence into security monitoring processes.
- Contribute to the development of threat intelligence feeds to enhance proactive threat detection.
- Security Tool Management:
- Manage and optimise SIEM tools, ensuring they are properly configured and updated to maximize effectiveness.
- Own the development and implementation of SOC Use Cases
- Evaluate new security technologies and recommend enhancements to the security infrastructure.
- Collaboration:
- Collaborate with cross-functional teams, including IT, legal, and management, to address security incidents and implement preventive measures.
- Provide expertise and guidance to other analysts.
- Working with the Technical Teams to ensure all new and changed services are monitored accordingly
- Documentation:
- Maintain accurate and up-to-date documentation of security procedures, incident response plans, and analysis reports.
- Create post-incident reports for management and stakeholders.
- Support the creation of monthly reporting packs as per contractual requirements.
- Create and document robust event and incident management processes, Runbooks & Playbooks
- Other responsibilities:
- Involvement in scoping and standing up new solutions for new opportunities
- Assisting Pre-Sales team with requirements on new opportunities
- Demonstrations of SOC tools to clients
- Continual Service Improvement β Recommendations for change to address incidents or persistent events.
What you\βll bring;
- Must be able to obtain SC Clearance or already hold SC clearance.
- Must have a good understanding on Incident Response approaches
- Must have knowledge and hands-on knowledge of Splunk.
- Strong verbal and written English communication.
- Strong interpersonal and presentation skills.
-
Strong analytical skills
-
Must have good understanding on network traffic flows and able to understand normal and suspicious activities.
- Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (Penetration Testing)
- Strong understanding of Digital Forensics and Incident Response (DFIR) principles.
- Ability to reverse engineer attacks to understand what actions took place.
- Knowledge of ITIL disciplines such as Incident, Problem and Change Management.
- Ability to work with minimal levels of supervision.
- Willingness to work in a job that involves 24/7 operations or on call.
Education Requirements & Experience
- Minimum of 3 to 5 years of experience in the IT security industry, preferably working in a SOC/NOC environment.
-
Preferably holds Cyber Security Certification e.g. ISC2 CISSP, GIAC, SC-200
-
Experience with Cloud platforms (AWS and/or Microsoft Azure)
- Excellent knowledge of Microsoft Office products, especially Excel and Word
We offer a range of tailored benefits that support your physical, emotional, and financial wellbeing. Our Learning and Development team ensure that there are continuous growth and development opportunities for our people. We also offer the opportunity to have flexible work options.
You can find more information about NTT DATA UK & Ireland here:
We are an equal opportunities employer. We believe in the fair treatment of all our employees and commit to promoting equity and diversity in our employment practices. We are also a proud Disability Confident Committed Employer β we are committed to creating a diverse and inclusive workforce. We actively collaborate with individuals who have disabilities and long-term health conditions which have an effect on their ability to do normal daily activities, ensuring that barriers are eliminated when it comes to employment opportunities. In line with our commitment, we guarantee an interview to applicants who declare to us, during the application process, that they have a disability and meet the minimum requirements for the role. If you require any reasonable adjustments during the recruitment process, please let us know. Join us in building a truly diverse and empowered team.
P3 Senior SOC Analyst (L3)
We are currently recruiting a Senior SOC Analyst L3 Managed Detection and Response to join our growing Security Operations Centre business.
This role will be based full time on site in Birmingham.
About Us
NTT DATA is one of the world\βs largest Global Security services providers with over 7500 Security SMEs and Integration partner to many of the worlds most recognised Security Technology providers. We strive to hire exceptional, innovative, and passionate individuals who want to grow with us. In a constantly changing world, we work together with our people, clients and communities to enable them to fulfil their potential to do great things. We believe that by bringing everyone together, we can solve problems using innovative technology that can create a world that is sustainable and secure.
This is a great opportunity for you to play a pivotal role in helping to shape our client\βs transformation journeys.
Senior Soc Analyst Level 3 employer: NTT DATA
Contact Detail:
NTT DATA Recruiting Team
StudySmarter Expert Advice π€«
We think this is how you could land Senior Soc Analyst Level 3
β¨Tip Number 1
Familiarise yourself with the latest cybersecurity threats and vulnerabilities. Being well-versed in current trends will not only help you during interviews but also demonstrate your proactive approach to security.
β¨Tip Number 2
Engage with the cybersecurity community through forums, webinars, or local meetups. Networking can provide valuable insights and connections that may lead to job opportunities at NTT DATA.
β¨Tip Number 3
Showcase your hands-on experience with SIEM tools like Microsoft Sentinel. If you have any personal projects or case studies, be ready to discuss them in detail to highlight your practical skills.
β¨Tip Number 4
Prepare for scenario-based questions that assess your incident response capabilities. Think of examples from your past experiences where you successfully managed security incidents and how you applied best practices.
We think you need these skills to ace Senior Soc Analyst Level 3
Some tips for your application π«‘
Tailor Your CV: Make sure your CV highlights relevant experience in security operations, incident response, and any specific tools mentioned in the job description, such as Microsoft Sentinel. Use keywords from the job listing to ensure your application stands out.
Craft a Compelling Cover Letter: In your cover letter, express your passion for cybersecurity and detail how your skills align with the responsibilities of the Senior SOC Analyst role. Mention specific experiences that demonstrate your ability to manage incidents and conduct thorough investigations.
Showcase Relevant Certifications: If you hold any cybersecurity certifications like CISSP or GIAC, be sure to include them prominently in your application. This will help establish your credibility and expertise in the field.
Highlight Soft Skills: The role requires strong interpersonal and presentation skills. In your application, provide examples of how you've effectively communicated complex security issues to non-technical stakeholders or collaborated with cross-functional teams.
How to prepare for a job interview at NTT DATA
β¨Showcase Your Technical Skills
Make sure to highlight your hands-on experience with SIEM tools, especially Microsoft Sentinel. Be prepared to discuss specific incidents you've managed and the techniques you used for root cause analysis.
β¨Demonstrate Incident Response Knowledge
Familiarise yourself with various incident response approaches. Be ready to explain how you would handle different types of security incidents and the steps you would take to contain and remediate them.
β¨Stay Updated on Cybersecurity Trends
Research the latest cybersecurity threats and vulnerabilities. Showing that you are proactive in keeping up with industry trends will demonstrate your commitment to the role and your ability to integrate threat intelligence into security monitoring.
β¨Prepare for Scenario-Based Questions
Expect scenario-based questions where you may need to outline your approach to a hypothetical security incident. Practising these scenarios can help you articulate your thought process and decision-making skills effectively.