At a Glance
- Tasks: Join our team to combat cyber threats and protect businesses from attacks.
- Company: CyberClan, a leading cybersecurity firm with a global presence.
- Benefits: Flexible remote work, competitive salary, and opportunities for professional growth.
- Why this job: Make a real difference in cybersecurity while developing your skills in a dynamic environment.
- Qualifications: GCSE level education and a Cyber Security qualification are required.
- Other info: Be part of a supportive team that values continuous learning and improvement.
The predicted salary is between 36000 - 60000 £ per year.
Established in 2006, CyberClan’s carefully selected team of experts are capable of solving complex cyber security challenges – keeping data secure and businesses running as usual. CyberClan’s Global Incident Response Teams are available 24/7/365 to leap into action, responding to all cyber attacks with proven defensive methodology. Our goal is to get businesses fully operational as quickly as possible and to further prevent any downtime or impact to the business operations.
The Security Operations team exists to protect the client by proactively detecting and responding to cyber security incidents. As a member of a growing team, you will provide defence against cyber-attacks and play a vital role in the monitoring, analysis and management of security events/incidents emanating from client networks and systems. This is a hands-on operational role where you will be deeply involved in day-to-day incidents using your broad experience to combat threats and resolve incidents in a timely manner. This role requires willingness to work shifts (including unsociable hours and bank holidays where these fall into your shift pattern) as part of a 24x7 team.
This role reports to the SOC Manager.
Essential Functions- Responsible for providing Tier 2 case resolution, resolving complex security cases including generating initial reporting, providing follow-ups and requesting information and resolution activity.
- Day to day incident triage and escalation using contextual and threat intelligence.
- Responsible for providing security expertise to escalated incidents.
- Act as the incident handler for P1/P2 incidents.
- Provide and support in-depth SIEM and Incident notification toolset administration and configuration.
- Fully utilise threat intelligence capabilities for proactive threat hunting.
- Responsible for providing communication directly with CyberClan’s customers regarding security incidents and other related topics.
- Aid in the development of incident response procedures and playbooks.
- Technical liaison between other service lines including threat hunting, incident response and incident investigation.
- Contribute to the design and development of defence and response strategies, knowledgebase and playbooks.
- Monitoring SIEM alerts effectively to minimize downtime and restore services.
- Ensure investigation steps are clearly documented and accurately escalated when needed.
- Responsible for producing and maintaining documentation relevant to both the SOC and position.
- Responsible for updating and offering continual improvement to the knowledge base.
- Support the SOC team research global security events, issues and trends to produce security advisories for customers based on findings.
- Responsible for managing and configuring security monitoring tools.
- Investigating intrusion attempts and performing in-depth exploit analysis.
- Provide analytical feedback on client network traffic patterns.
- Provide analytical feedback related to malware and other network threats.
- Accept, manage and update service requests and incidents to ensure contracted Service Level Agreements are met.
- Guiding, coaching and mentoring analysts who are providing the core SOC functions, including but not limited to, alert triage, incident escalation, content creation etc.
- To continuously develop both technical and personal skills required within the role and assist with development of other staff.
- Keep up to date on security developments and news.
- Conducting cyber threat research and analysis for purposes of improving the strength of network security.
- Assist with defining, testing and operating new ways of working with new technology solutions or processes supplied to the SOC team.
- Participate in identification and delivery of Service Improvement Plans.
- Proactively support business KPIs.
- Work with the CyberClan global team when responding to security incidents.
- Understand and comply with all Information Security policies.
- Follow agreed security best practices and SOC processes.
- Interact with strategic incident response and threat intelligence vendors.
- To undertake other responsibilities, training and tasks as reasonably requested by line management.
- Undertake periodic assurance reviews and produce associated reporting as required.
- Participate in CyberClan internal security awareness initiatives and other training requests.
- Responsible and accountable for ensuring all employment legislative requirements are adhered to including equality, diversity and health and safety issues.
The job description may be altered at any time in line with the level of the post to meet changing requirements, but only in full consultation with the post holder.
Monthly Reporting & Communications- Deliver monthly security reports to assigned clients, highlighting key metrics, resolved incidents, and emerging threats.
- Create and present executive summaries of security incidents and resolution activities to client stakeholders.
- Conduct regular client briefings on threat landscape developments relevant to their industry sector.
- Maintain ongoing communications with client technical teams regarding security events requiring their attention.
- Assist in client security environment documentation during the onboarding phase.
- Conduct knowledge transfer sessions to familiarize new clients with SOC processes and reporting procedures.
- Participate in the initial baseline creation of client environment to establish normal behaviour patterns.
- Build relationships with client security teams to facilitate smoother incident response.
- Develop and deliver training sessions for Tier 1 analysts on emerging threats and detection techniques.
- Create educational materials for clients on security best practices and threat awareness.
- Provide hands-on mentoring to junior SOC team members.
- Create and maintain incident response playbooks and runbooks for T1s.
- Document detailed procedures for handling common security incidents within client environments.
- Contribute to the development of standard operating procedures for client engagement.
- Educated to GCSE level or equivalent.
- Cyber Security Qualification (COMPTIA or equivalent experience).
- ITIL Foundation.
- Previous experience in a similar position.
- Knowledge and experience of SOC tooling to identify threats.
- Experience of collaboration tools.
- Keen analytical mind and approach.
- Proactively shares own expertise with others.
- Knowledge and experience of IT systems, networking and security threat landscape including:
- Network fundamentals for example OSI stack, TCP/IP, DNS, HTTPS, firewall logs, packet capture and analysis.
- Cloud technologies (AWS, Google Cloud, Azure).
- Active Directory, Group Policies, PowerShell.
- Endpoint protection applications (Antivirus, Web Filtering, ATP, Encryption).
- IDP/IPS Systems.
- SIEM tools (such as Splunk).
- SOAR is an added advantage.
- Knowledge of malware capabilities, attack vectors and impact.
- Knowledge of the MITRE ATT&CK framework to understand threat actors and how to mitigate them.
- Knowledge and experience in threat analysis.
- Excellent interpersonal skills sufficient to develop professional relationships and rapport amongst key stakeholders.
- Strong team player.
- Genuine enthusiasm and drive to work within cyber security.
- Excellent customer service skills.
- Good written skills to write explanations of systems, regulations and/or procedures.
- Good verbal communication.
- Ability to identify and suggest continual improvement.
- Good analytical and problem-solving skills.
- Ability to adapt to organisational change.
- Proven ability to manage varied workload.
- Ability to work unsupervised and under pressure.
Job Type: Full-time/Exempt
Location: 100% Telecommuting
% of Travel Required: 0-5%
Physical Requirements: Prolonged periods of sitting at a desk and working on a computer.
CyberClan is an equal opportunity employer. All applicants will be considered for employment without attention to race, colour, religion, sex, sexual orientation, gender identity, national origin, veteran, or disability status.
Tier II SOC Analyst in Bristol employer: CyberClan
Contact Detail:
CyberClan Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Tier II SOC Analyst in Bristol
✨Tip Number 1
Network like a pro! Attend industry events, webinars, or local meetups to connect with other cyber security enthusiasts. You never know who might have the inside scoop on job openings or can put in a good word for you.
✨Tip Number 2
Show off your skills! Create a personal project or contribute to open-source initiatives related to cyber security. This not only boosts your portfolio but also demonstrates your passion and expertise to potential employers.
✨Tip Number 3
Prepare for interviews by brushing up on common SOC scenarios and incident response strategies. Practise articulating your thought process when tackling security incidents, as this will showcase your analytical skills and problem-solving abilities.
✨Tip Number 4
Don’t forget to apply through our website! We’re always on the lookout for talented individuals like you. Tailor your application to highlight your relevant experience and enthusiasm for the role, and let’s get you on board!
We think you need these skills to ace Tier II SOC Analyst in Bristol
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Tier II SOC Analyst role. Highlight relevant experience and skills that match the job description, like your knowledge of SOC tooling and incident response procedures.
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber security and how your background makes you a great fit for our team at CyberClan.
Show Off Your Skills: Don’t just list your qualifications; demonstrate them! Include specific examples of how you've tackled security incidents or contributed to team success in previous roles.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands and shows us you’re serious about joining our team!
How to prepare for a job interview at CyberClan
✨Know Your Cyber Security Basics
Before the interview, brush up on your knowledge of network fundamentals, SIEM tools, and the MITRE ATT&CK framework. Being able to discuss these topics confidently will show that you have a solid foundation in cyber security, which is crucial for a Tier II SOC Analyst.
✨Demonstrate Your Analytical Skills
Prepare to share specific examples of how you've tackled complex security incidents in the past. Use the STAR method (Situation, Task, Action, Result) to structure your responses, highlighting your analytical and problem-solving skills that are essential for this role.
✨Familiarise Yourself with CyberClan's Approach
Research CyberClan’s incident response methodology and their approach to threat hunting. Understanding their processes will not only help you answer questions more effectively but also demonstrate your genuine interest in the company and its mission.
✨Prepare Questions for Your Interviewers
Think of insightful questions to ask your interviewers about the team dynamics, ongoing projects, or the tools they use. This shows that you're engaged and eager to learn more about how you can contribute to the SOC team at CyberClan.