L2 SOC Analyst

L2 SOC Analyst

Full-Time 36000 - 60000 £ / year (est.) No home office possible
Acora - IT, Cyber & AI

At a Glance

  • Tasks: Monitor and respond to security threats while leading a team of analysts.
  • Company: Join Acora, a forward-thinking tech company embracing AI and innovation.
  • Benefits: Enjoy private medical, pension, gym membership, and 25 days annual leave.
  • Why this job: Make a real impact in cybersecurity and grow your skills in a dynamic environment.
  • Qualifications: Experience in security operations and a relevant degree or equivalent experience required.
  • Other info: Be part of a supportive team with excellent career growth opportunities.

The predicted salary is between 36000 - 60000 £ per year.

Benefits include Private Medical, Pension, 25 days annual leave, Gym Membership, Cycle to Work Scheme, and Employee Assistance Programme.

Working Hours: Between 0700 - 2200 (rotated shift)

Dress Code: Smart casual

The L2 Analyst is responsible for proactively monitoring and triaging operational alerts, ensuring timely investigation and resolution of incidents, and maintaining service stability. Acting as an L2 analyst, the role provides day-to-day operational oversight, coordinates analyst activities, and serves as the escalation point for complex issues.

Role Responsibilities:

  • Proactive monitoring and response of known and or emerging threats against the network.
  • Gathering information about high-value assets, threat landscape, and breach exposure from a myriad array of sources.
  • Conducting detailed & comprehensive investigation and triage on a wide variety of security events, and implement remediation processes.
  • Overseeing shift operations including managing analyst breaks and handling escalations.
  • Performing complex data analysis in support of security event management.
  • Participation in Incident Response that includes root cause and lessons learned.
  • Collaborating with Level 3 analysts, incident responders, engineering team, and customer’s security teams to coordinate incident response and remediation efforts.
  • Identifying opportunities to improve process and/or tools to ensure highest level of quality, including documentation and training sessions.
  • Mentoring and supporting junior analysts.
  • Participating in shifts, on-call and after hours support of incident management.
  • Managing shift resources and activities, supervising, monitoring, mentoring and acting as escalation point for L1s, driving shift metrics and managing shift handovers.
  • Performing binary analysis on suspicious files.
  • Participation in the development of new SIEM rules and analytics.
  • Conducting security research and intelligence gathering in regards to emerging threats and exploits.
  • Participating in Customer projects.
  • Completing monthly reports and handling monthly client meetings.

Skills, Knowledge & Experience:

  • Security/Network operations or engineering, Administration on Unix, Linux, or Windows.
  • Proven experience with common security operations systems, Intrusion Detection Systems (IDS/IPS), Security Incident Event Management systems (SIEM), anti-virus log collection systems, vulnerability management, etc.
  • Demonstrated experience with a wide variety of security logs to detect and resolve security issues.
  • Strong problem resolution, judgment and decision making skills.
  • Proactive and cooperative relationships exist within own team and other individuals/groups that interface with the team.
  • Familiarity with current legal and regulatory requirements around information security and privacy, including PCI, SOX, HIPAA, etc.
  • Experience with security events, including large-scale breaches, is a must; as is the ability to identify themes and trends out of large datasets.
  • CISSP, GCIA, or GCIH certification required.
  • BA/BS in Computer Science, Information Security, or related field or three years of equivalent experience.

The Interview Process:

  • Screening call: Phone call with our recruitment team to assess your suitability for the role, but also if the role is right for you.
  • First interview: Video call over MS Teams with Cyber Operations Manager.
  • Second interview: Site based with the Cyber Operations Manager & SOC Team Member.

Equal Opportunities at Acora:

Acora is an equal opportunity employer, committed to providing equal opportunities regardless of race or ethnic origin, gender identity, family situation, sexual orientation, disability, religion or age. We hire our people on the basis of qualifications, merit, skills, and business need. We are a Level 1 Disability Confident Committed Employer and will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, perform essential job functions, and receive equitable benefits and all privileges of employment. Please contact us to request any reasonable adjustments.

L2 SOC Analyst employer: Acora - IT, Cyber & AI

Acora is an exceptional employer that fosters a dynamic and inclusive work culture, offering a range of benefits including private medical insurance, a generous pension scheme, and 25 days of annual leave. With a strong emphasis on employee growth, Acora provides opportunities for mentorship and professional development, ensuring that team members are equipped to excel in their roles while contributing to innovative projects in the fast-paced IT and Cybersecurity landscape.
Acora - IT, Cyber & AI

Contact Detail:

Acora - IT, Cyber & AI Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land L2 SOC Analyst

✨Tip Number 1

Get your networking game on! Reach out to current or former employees at Acora on LinkedIn. A friendly chat can give you insider info and maybe even a referral, which can really boost your chances.

✨Tip Number 2

Prepare for the interview like it’s a big exam. Research Acora’s values and think about how your experience aligns with them. Be ready to share specific examples of how you've tackled challenges in previous roles.

✨Tip Number 3

Practice makes perfect! Do mock interviews with friends or use online platforms. The more comfortable you are talking about your skills and experiences, the better you'll come across during the real deal.

✨Tip Number 4

Don’t forget to follow up after your interviews! A quick thank-you email can leave a lasting impression and shows that you’re genuinely interested in the role. Plus, it keeps you on their radar!

We think you need these skills to ace L2 SOC Analyst

Proactive Monitoring
Incident Investigation
Data Analysis
Security Event Management
Intrusion Detection Systems (IDS/IPS)
Security Incident Event Management (SIEM)
Vulnerability Management
Problem Resolution
Judgment and Decision Making
Legal and Regulatory Compliance
Binary Analysis
Security Research
Mentoring
Collaboration

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to the L2 SOC Analyst role. Highlight relevant experience, especially in security operations and incident management. We want to see how your skills match what we're looking for!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cybersecurity and how you can contribute to our team at Acora. Keep it concise but impactful!

Showcase Your Skills: Don’t forget to mention any certifications like CISSP or GCIH, and your experience with SIEM systems. We love seeing candidates who are proactive and have a solid understanding of security threats.

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets to us quickly and efficiently. Plus, you’ll find all the info you need about the role there!

How to prepare for a job interview at Acora - IT, Cyber & AI

✨Know Your Stuff

Make sure you brush up on your knowledge of security operations, especially around SIEM systems and IDS/IPS. Be ready to discuss your experience with security logs and how you've tackled security issues in the past. This will show that you're not just familiar with the tools but can also apply them effectively.

✨Show Your Problem-Solving Skills

Prepare to share specific examples of how you've resolved complex security incidents. Think about times when you had to analyse large datasets or identify trends from security events. This will demonstrate your analytical skills and ability to think critically under pressure.

✨Be a Team Player

Since collaboration is key in this role, be ready to talk about how you've worked with others in previous positions. Highlight any mentoring experiences or how you've supported junior analysts. This will align with Acora's value of 'Together We Win' and show that you can contribute positively to the team dynamic.

✨Ask Smart Questions

Prepare thoughtful questions about the role and the company culture. Inquire about the team's approach to incident response or how they handle shift operations. This shows your genuine interest in the position and helps you assess if it's the right fit for you.

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>