Senior SOC Analyst in London

Senior SOC Analyst in London

London Full-Time No home office possible
B

At a Glance

  • Tasks: Monitor security incidents and respond to threats in a fast-paced environment.
  • Company: Leading investment bank with a strong focus on cybersecurity.
  • Benefits: Competitive pay, hybrid work model, and opportunities for professional growth.
  • Other info: Exciting challenges and a chance to make a real difference in security.
  • Why this job: Join a dynamic team and protect critical assets in the financial sector.
  • Qualifications: 5+ years in cybersecurity, expert in Splunk, and strong analytical skills.

Client: Investment Bank

Location: London, hybrid 3 days

Rate: up to £500 (inside IR35)

Requirements:

  • 5+ years of experience in a Security Operations Center or similar cybersecurity role.
  • Expert knowledge of Splunk (preferably Splunk Enterprise Security).
  • Strong experience in SPL (Search Processing Language) and log analysis.
  • Deep understanding of security monitoring, incident response, and threat detection methodologies.
  • Familiarity with MITRE ATT&CK, cyber kill chain, and common attack vectors (phishing, malware, insider threats).
  • Experience with EDR tools (e.g., CrowdStrike, SentinelOne), firewalls, IDS/IPS, and SOAR platforms.
  • Working knowledge of Windows and Linux internals from a security perspective.

Senior SOC Analyst in London employer: Bonhill Partners

As a Senior SOC Analyst at our prestigious investment bank in London, you will thrive in a dynamic and inclusive work culture that prioritises employee growth and development. We offer competitive rates, flexible hybrid working arrangements, and access to cutting-edge cybersecurity tools, ensuring you are well-equipped to tackle the challenges of the ever-evolving threat landscape. Join us to be part of a forward-thinking team that values innovation and collaboration, making a meaningful impact in the financial sector.

B

Contact Detail:

Bonhill Partners Recruiting Team

StudySmarter Expert Advice🤫

We think this is how you could land Senior SOC Analyst in London

Tip Number 1

Network like a pro! Reach out to your connections in the cybersecurity field, especially those who work in investment banks. A friendly chat can lead to insider info about job openings or even a referral.

Tip Number 2

Show off your skills! Prepare a portfolio or case studies that highlight your experience with Splunk and incident response. This will give you an edge during interviews and show that you know your stuff.

Tip Number 3

Stay updated on the latest trends in cybersecurity. Follow relevant blogs, podcasts, or forums. Being able to discuss current threats and solutions will impress interviewers and show your passion for the field.

Tip Number 4

Don’t forget to apply through our website! We’ve got loads of opportunities that might just be perfect for you. Plus, it’s a great way to ensure your application gets seen by the right people.

We think you need these skills to ace Senior SOC Analyst in London

Security Operations Center (SOC) experience
Splunk
Search Processing Language (SPL)
Log Analysis
Security Monitoring
Incident Response
Threat Detection Methodologies

Some tips for your application 🫡

Tailor Your CV:Make sure your CV highlights your 5+ years of experience in a Security Operations Center or similar role. We want to see your expert knowledge of Splunk and any relevant tools you've worked with, so don’t hold back!

Showcase Your Skills:When writing your application, emphasise your strong experience in SPL and log analysis. We love seeing candidates who can demonstrate a deep understanding of security monitoring and incident response methodologies.

Be Specific About Tools:Mention your familiarity with EDR tools like CrowdStrike or SentinelOne, as well as your experience with firewalls and IDS/IPS. We’re looking for someone who knows their stuff, so be specific about the tools you’ve used.

Apply Through Our Website:We encourage you to apply through our website for a smoother process. It helps us keep track of your application and ensures you don’t miss out on any important updates from us!

How to prepare for a job interview at Bonhill Partners

Know Your Stuff

Make sure you brush up on your knowledge of Splunk and SPL. Be ready to discuss specific use cases where you've used these tools in your previous roles. The more detailed examples you can provide, the better!

Understand the Threat Landscape

Familiarise yourself with the MITRE ATT&CK framework and common attack vectors. Be prepared to talk about how you've applied this knowledge in real-world scenarios, especially regarding incident response and threat detection.

Showcase Your Experience

With over 5 years in a Security Operations Center, you should have plenty of stories to share. Think about significant incidents you've managed or resolved, and be ready to explain your thought process and actions taken during those situations.

Technical Know-How is Key

Since the role requires a solid understanding of both Windows and Linux internals, make sure you can discuss security perspectives on both systems. Prepare to answer technical questions that may test your knowledge in these areas.