At a Glance
- Tasks: Monitor security alerts and manage incidents to protect customers from cyber threats.
- Company: Join a leading Microsoft partner with a multi-award-winning culture.
- Benefits: Flexible remote work, competitive salary, and opportunities for professional growth.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge Microsoft technologies.
- Qualifications: Experience in SOC environments and knowledge of Microsoft security tools required.
- Other info: Dynamic team environment with strong career advancement potential.
The predicted salary is between 36000 - 60000 Β£ per year.
High level overview
Essentially 3x Microsoft Security advanced L2 SOC Analysts, or L3 SOC Analysts, depending on your work environments, to base out of sites in either Manchester, Birmingham or Maidenhead but only a handful of days a month on site. SC Level Security clearance will be provided (5 years minimum in the UK only to pass clearance). You\βll review security incidents occurring in their customers\β environments, alerting them to malicious activities and working with them to investigate and remediate the incidents to resolution.
The Company
You will work for one of Microsoft UK\βs deepest embedded partners in their Managed XDR Security Operations Center (SOC) team. They deliver Microsoft security services and solutions among other services, into enterprise customers across Commercial, Public Sector, Government and Microsoft fronted critical national infrastructure focusing on Microsoft XDR SOC services for Sentinel, Defender and more!
They\βre also a Microsoft Security Solutions Partner (with all 6 solutions partner designations in total), have multiple Microsoft Advanced specializations including all the security ones, and have a Microsoft certified MXDR SOC. A Microsoft Intelligent Security Association (MISA) member they are one of the biggest names in IT Services in the UK with a multi award winning culture built around the values of its people.
The role
As a Senior level SOC analyst/incident response expert in the Microsoft Security operations team, you\βll be responsible for:
- Monitoring for security alerts from Security Platforms, primarily Microsoft Sentinel/Defender. Providing advanced second line security incident management and analysis to the customers through effective monitoring, reporting, and technical guidance for successful resolution
- Maintaining high levels of ownership through the security incident lifecycle
- Documenting and managing cases to utilise information for customers reports, providing insight and intelligent recommendations
- Interfacing with our customers to resolve issues, provide additional information, and answer questions related to incidents and monitoring
- Maintaining high quality security incident resolution and performance adherence
- Identifying and reporting tuning and automation opportunities
Ideally you will have
- Experience working in a Microsoft MDR/XDR SOC
- Preferably MSSP environment experience, although if you\βve previously been in busy end customer SOC environment this will be considered
- The ability to dynamically assess risks, threats & threat actors for new and existing customers
- KQL (Kusto Query Language) experience
- Cyber qualifications such as the Microsoft SC-200 or related certs
- Previous experience with SIEM tools including Microsoft Sentinel, and Defender
- Familiarity with cyber security concepts and their application in different business environments
- Detail orientated, with excellent communication skills and the ability to take a structured approach to procedures and working instructions for incident response/resolution
#J-18808-Ljbffr
Senior Security Operations (SOC) Analyst/Responder x3 employer: Cloud Decisions
Contact Detail:
Cloud Decisions Recruiting Team
StudySmarter Expert Advice π€«
We think this is how you could land Senior Security Operations (SOC) Analyst/Responder x3
β¨Tip Number 1
Network like a pro! Reach out to folks in the industry on LinkedIn or at local meetups. You never know who might have the inside scoop on job openings or can put in a good word for you.
β¨Tip Number 2
Show off your skills! Prepare a portfolio or case studies of past incidents you've handled. This will give potential employers a clear picture of what you can bring to their SOC team.
β¨Tip Number 3
Ace the interview! Research common SOC analyst interview questions and practice your responses. Be ready to discuss your experience with Microsoft Sentinel and Defender, as well as any KQL queries you've written.
β¨Tip Number 4
Apply through our website! Weβve got loads of opportunities waiting for you. Plus, applying directly shows your enthusiasm and commitment to joining our awesome team.
We think you need these skills to ace Senior Security Operations (SOC) Analyst/Responder x3
Some tips for your application π«‘
Tailor Your CV: Make sure your CV is tailored to the role of Senior Security Operations Analyst. Highlight your experience with Microsoft Sentinel and Defender, and any relevant cyber qualifications. We want to see how your skills match what we're looking for!
Showcase Your Experience: In your application, donβt just list your previous roles; explain how your experience in SOC environments has prepared you for this position. We love seeing real-world examples of how you've tackled security incidents and provided solutions.
Be Clear and Concise: When writing your cover letter or application, keep it clear and to the point. We appreciate straightforward communication, especially when it comes to complex topics like security incidents. Make it easy for us to see your value!
Apply Through Our Website: We encourage you to apply directly through our website. Itβs the best way for us to receive your application and ensures youβre considered for the role. Plus, itβs super easy to do!
How to prepare for a job interview at Cloud Decisions
β¨Know Your Tech Inside Out
Make sure you brush up on your knowledge of Microsoft Sentinel and Defender, as well as KQL. Be ready to discuss how you've used these tools in past roles, and think of specific incidents where you successfully managed security alerts.
β¨Showcase Your Incident Management Skills
Prepare examples that highlight your experience with the security incident lifecycle. Talk about how you've documented cases and provided insights for customer reports, demonstrating your ownership and attention to detail.
β¨Communicate Clearly and Confidently
Since you'll be interfacing with customers, practice explaining complex security concepts in simple terms. Think about how you can convey technical information effectively, as strong communication skills are key in this role.
β¨Be Ready to Discuss Automation Opportunities
Think about any tuning or automation opportunities you've identified in previous roles. Be prepared to share your ideas on how to improve processes within a SOC environment, as this shows your proactive approach to security operations.