At a Glance
- Tasks: Monitor and analyse cyber threats while collaborating with a dynamic team.
- Company: Join BAE Systems, a leader in digital intelligence and cybersecurity.
- Benefits: Enjoy hybrid working, competitive salary, and opportunities for professional growth.
- Other info: Diverse and inclusive culture with excellent career advancement opportunities.
- Why this job: Make a real impact in defending critical systems against cyber threats.
- Qualifications: Basic Python skills and experience with security tools like Splunk.
The predicted salary is between 30000 - 40000 € per year.
BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments.
BAE Systems have been contracted to undertake the day to day operation of (and incremental improvement of) a dedicated Security Operations Centre (SOC) to support the defence of a major UK CNI organisation. The networks protected are predominantly hosted in Azure and AWS cloud platforms, with many hundred systems within these environments that must be protected. The customer is committed to development of this improved SOC to be a benchmark of best practice and excellence in reflection of the significant threat that the protected systems are subject to.
The SOC will be staffed by a blend of customer and BAE Systems staff, based in multiple locations, but with the day to day operations based from our Leeds office (due to the need for customer network access available at this location). These roles require a minimum of SC clearance and be prepared to undergo DV clearance. Due to timelines for the start of operations, it will not be possible to sponsor new clearances so candidates must have existing clearances.
Responsibilities
- Monitor, triage, analyse and investigate alerts, log data and network traffic using the Protective Monitoring platform and Internet resources to identify cyber-attacks / security incidents.
- Categorise all suspected incidents in line with the Security Incident policy.
- Recognise potential, successful and unsuccessful intrusion attempts and compromises through reviews and further analysis of relevant event detail and incident summary information.
- Write up high quality security incident tickets using a combination of existing knowledge resources and independent research.
- Assist with remediation activities (or support customer stakeholders) to inhibit cyber-attacks, clean up IT systems and secure networks against repeat attacks.
- Produce security incident review reports to present information about the security incident and provide security improvement recommendations based on the security incident review.
- Understand Threat Intelligence and its use in an operational environment.
- Support incident response to national scale incidents in a coaching capacity.
- Work with other teams within BAE to improve services on the basis of customer needs.
Requirements
Technical
- Basic Python and/or scripting skills, Windows, OS X, and Linux.
- Experience using Splunk and Sentinel.
- Working with a range of security tooling/technology.
- Strong understanding of security architecture, in particular networking.
- Detailed understanding of threat intelligence and threat actors, TTPs and operationalising threat intelligence.
- Experience in investigating complex network intrusions (by state-sponsored groups or targeted ransomware attacks).
- Understand TCP/IP component layers to identify normal and abnormal traffic.
- Understanding of AWS &/or Azure cloud services.
- Experience of Splunk (with ES) &/or Sentinel, content development experience desirable.
Non-technical
- Client side consulting, including stakeholder engagement and the ability to communicate insights and concepts to others (including briefing skills and report writing).
- Security process development.
- Able to understand and adapt to different cultures and hierarchical structures.
- Self-starter and capable of independent working.
Desirable
- Software engineering experience.
- Penetration testing skills.
Life at BAE Systems Digital Intelligence
We are embracing Hybrid Working. This means you and your colleagues may be working in different locations, such as from home, another BAE Systems office or client site, some or all of the time, and work might be going on at different times of the day. By embracing technology, we can interact, collaborate and create together, even when we’re working remotely from one another. Hybrid Working allows for increased flexibility in when and where we work, helping us to balance our work and personal life more effectively, and enhance well-being.
Diversity and inclusion are integral to the success of BAE Systems Digital Intelligence. We are proud to have an organisational culture where employees with varying perspectives, skills, life experiences and backgrounds – the best and brightest minds – can work together to achieve excellence and realise individual and organisational potential.
Junior SOC Analyst in Leeds employer: BAE
BAE Systems Digital Intelligence is an exceptional employer, offering a dynamic work environment in Leeds where innovation and collaboration thrive. With a strong commitment to employee growth, we provide opportunities for professional development in the rapidly evolving field of cybersecurity, all while embracing a hybrid working model that promotes work-life balance. Our inclusive culture values diverse perspectives, ensuring that every team member can contribute to meaningful projects that protect critical national infrastructure.
StudySmarter Expert Advice🤫
We think this is how you could land Junior SOC Analyst in Leeds
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, attend meetups or webinars, and connect with current employees at BAE Systems. You never know who might give you a heads-up about job openings or even refer you directly!
✨Tip Number 2
Show off your skills! If you've got experience with Python, Splunk, or any of the tools mentioned in the job description, make sure to highlight that in conversations. Bring examples of your work to interviews to demonstrate your expertise.
✨Tip Number 3
Prepare for the interview by brushing up on your knowledge of threat intelligence and security processes. Be ready to discuss how you would handle real-world scenarios, as this will show you're not just book-smart but also practical.
✨Tip Number 4
Apply through our website! It’s the best way to ensure your application gets seen. Plus, it shows you’re genuinely interested in joining the team at BAE Systems. Don’t forget to follow up after applying to keep your name fresh in their minds!
We think you need these skills to ace Junior SOC Analyst in Leeds
Some tips for your application 🫡
Tailor Your CV:Make sure your CV is tailored to the Junior SOC Analyst role. Highlight your relevant skills, especially in Python, Splunk, and any experience with cloud services like AWS or Azure. We want to see how your background fits into our world!
Craft a Compelling Cover Letter:Your cover letter is your chance to shine! Use it to explain why you're passionate about cybersecurity and how your experiences align with our mission at BAE Systems. Let us know what makes you the perfect fit for our team.
Showcase Your Problem-Solving Skills:In your application, don’t just list your skills—show us how you've used them! Share examples of how you've tackled security incidents or improved processes in previous roles. We love seeing candidates who can think on their feet!
Apply Through Our Website:We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, you’ll find all the details you need about the role and our company culture there!
How to prepare for a job interview at BAE
✨Know Your Tech
Make sure you brush up on your technical skills, especially in Python and security tools like Splunk and Sentinel. Familiarise yourself with cloud services like AWS and Azure, as these are crucial for the role.
✨Understand the Threat Landscape
Be prepared to discuss current cyber threats and how they impact organisations. Show that you understand threat intelligence and can articulate how it applies to incident response and security architecture.
✨Practice Incident Reporting
Since writing high-quality security incident tickets is part of the job, practice summarising incidents clearly and concisely. Use examples from your experience to demonstrate your ability to analyse and report on security events.
✨Engage with Stakeholders
Highlight your communication skills and ability to engage with different stakeholders. Be ready to discuss how you would present insights and recommendations to both technical and non-technical audiences.