At a Glance
- Tasks: Join our SOC team to monitor and analyse cyber threats 24/7.
- Company: Be part of a world-class defence organisation in Stevenage, Hertfordshire.
- Benefits: Earn £85 per hour with overtime options and flexible shift patterns.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technologies.
- Qualifications: Background in Cyber Security or related fields is essential.
- Other info: Initial SC clearance required; DV clearance needed later.
The predicted salary is between 68000 - 85000 £ per year.
Job Description
- Effective Tier 1 to 2 alert triage of security events
- Monitoring of Cyber Security tools
- Monitoring the SOC email notification mailboxes
- Assists with the maintenance of Security technologies
- Assisting the SOC Solutions Lead with project activity
- Assist proactive threat hunting in collaboration with the CTI function
- Assist IR in HR and InfoSec related investigations
- Ensure the timely triage and remediation of any incident or request tickets raised to the SOC
- Participate in the activity of adding/removing URLs from the AcceptList and BlockList
- Attend routine security meetings
- Conduct activities in line with SOC Maturity and continuous improvement
Skillset/experience required (Baseline):
- A career background in Cyber Security. Security awareness and experience in all areas of IT, primarily Network Security, Infrastructure and the secondary area being Operating Systems & Applications.
- Knowledge of IT Security standard methodologies.
- Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S.
- Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools.
- Hands on experience with IDS/IPS technologies and threat hunting activities.
- Strong analytical experience and mind-set.
- Experience within Defensive Cyber-attack methodologies and frameworks.
- Understanding of Malware capabilities, attack vectors, propagation and impact.
- Good communication skills liaising with the business and suppliers.
Desirable Skillset/experience (Senior grade):
- Root cause analysis and leading T2 incident investigations
- Process / Playbook / Runbook development
- Working knowledge of detection engineering, false positive improvements
- Capability to tune SIEM rules or create custom detections
- Scripted automation experience e.g. Python, SOAR, PowerShell
- Threat modelling and Hunting methodologies
SOC Analyst employer: Certain Advantage
Contact Detail:
Certain Advantage Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Analyst
✨Tip Number 1
Familiarise yourself with the specific tools and technologies mentioned in the job description, such as SIEM and Network Packet Capture platforms. Having hands-on experience or even a solid understanding of these tools can set you apart during interviews.
✨Tip Number 2
Network with professionals already working in SOC roles or similar positions. Engaging with them on platforms like LinkedIn can provide insights into the role and may even lead to referrals, which can significantly boost your chances of landing the job.
✨Tip Number 3
Stay updated on the latest trends and threats in cyber security. Being able to discuss current events or recent breaches during your interview will demonstrate your passion for the field and your proactive approach to threat detection.
✨Tip Number 4
Prepare to discuss your analytical skills and past experiences in detail. Be ready to share specific examples of how you've handled security incidents or contributed to threat hunting activities, as this will showcase your practical knowledge and problem-solving abilities.
We think you need these skills to ace SOC Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in cyber security, particularly in SOC analysis and threat detection. Use keywords from the job description to demonstrate your fit for the role.
Craft a Strong Cover Letter: Write a cover letter that showcases your passion for cyber security and your understanding of the SOC Analyst role. Mention specific skills and experiences that align with the responsibilities outlined in the job description.
Highlight Relevant Skills: In your application, emphasise your knowledge of security tools, incident response, and threat hunting methodologies. Provide examples of how you've applied these skills in previous roles.
Proofread Your Application: Before submitting, carefully proofread your CV and cover letter for any spelling or grammatical errors. A polished application reflects your attention to detail, which is crucial in the field of cyber security.
How to prepare for a job interview at Certain Advantage
✨Showcase Your Cyber Security Knowledge
Make sure to brush up on your understanding of cyber security principles, especially those related to network security and incident response. Be prepared to discuss specific tools and methodologies you've used in previous roles.
✨Demonstrate Analytical Skills
As a SOC Analyst, strong analytical skills are crucial. Prepare examples of how you've successfully triaged alerts or conducted investigations in the past. Highlight your problem-solving abilities and how you approach complex security issues.
✨Familiarise Yourself with the Shift Patterns
Understand the shift patterns mentioned in the job description. Being aware of the rotating shifts will show your flexibility and willingness to adapt to the team's needs, which is essential for a role in a 24x7 SOC environment.
✨Prepare Questions for the Interviewers
Have a few insightful questions ready to ask the interviewers about the SOC's current challenges or the technologies they use. This shows your genuine interest in the role and helps you assess if the position aligns with your career goals.