Tier II SOC Analyst in Glasgow

Tier II SOC Analyst in Glasgow

Glasgow Full-Time 36000 - 60000 £ / year (est.) No home office possible
CyberClan

At a Glance

  • Tasks: Join our team to combat cyber threats and protect businesses from attacks.
  • Company: CyberClan, a leading cybersecurity firm with a global presence.
  • Benefits: Flexible remote work, competitive salary, and opportunities for professional growth.
  • Why this job: Make a real difference in cybersecurity while developing your skills in a dynamic environment.
  • Qualifications: GCSE level education and a Cyber Security qualification are required.
  • Other info: Be part of a supportive team that values continuous learning and improvement.

The predicted salary is between 36000 - 60000 £ per year.

Tier II SOC Analyst – JOB DESCRIPTION

Summary/Objective

Established in 2006, CyberClan’s carefully selected team of experts are capable of solving complex cyber security challenges – keeping data secure and businesses running as usual. CyberClan’s Global Incident Response Teams are available 24/7/365 to leap into action, responding to all cyber attacks with proven defensive methodology, we quickly identify, contain, eradicate and recover from a cyber attack. Our goal is to get businesses fully operational as quickly as possible and to further prevent any downtown or impact to the business operations.

The Security Operations team exists to protect the client by proactively detecting and responding to cyber security as a member of a growing team, you will provide defence against cyber-attacks and play a vital role in the monitoring, analysis and management of security events / incidents emanating from client networks and systems. This is a hands-on operational role where you will be deeply involved in day-to-day incidents using your broad experience to combat threats and resolve incidents in a timely manner. This role requires willingness to work shifts (including unsociable hours and bank holidays where these fall into your shift pattern) as part of a 24×7 team.

This role reports to the SOC Manager

Essential Functions

  • Responsible for providing Tier 2 case resolution, resolving complex security cases including generating initial reporting, providing follow-ups and requesting information and resolution activity.
  • Day to day incident tirage and escalation using contextual and threat intelligence
  • Responsible for providing security expertise to escalated incidents
  • Act as the incident handler for P1/P2 incidents
  • Provide and support In-depth SIEM and Incident notification toolset administration and configuration
  • Fully utilise threat intelligence capabilities for proactive threat hunting
  • Responsible for providing communication directly with CyberClans’ customers regarding security incidents and other related topics.
  • Aid in the development of incident response procedures and playbooks
  • Technical liaison between other service lines including threat hunting, incident response and incident investigation.
  • Contribute to the design and development of defense and response strategies, knowledgebase and playbooks.
  • Monitoring SIEM alerts effectively to minimize downtime and restore services.
  • Ensure investigation steps are clearly documented and accurately escalated when needed.
  • Responsible for producing and maintaining documentation relevant to both the SOC and position.
  • Responsible for updating and offering continual improvement to the knowledge base.
  • Support the SOC team research global security events, issues and trends to produce security advisories for customers based on findings.
  • Responsible for managing and configuring security monitoring tools.
  • Investigating intrusion attempts and performing in-depth exploit analysis.
  • Provide analytical feedback on client network traffic patterns.
  • Provide analytical feedback related to malware and other network threats.
  • Accept, manage and update service requests and incidents to ensure contracted Service Level Agreements are met.
  • Guiding, coaching and mentoring analysts who are providing the core SOC functions, including but not limited to, alert triage, incident escalation, content creation etc.
  • To continuously develop both technical and personal skills required within the role and assist with development of other staff.
  • Keep up to date on security developments and news
  • Conducting cyber threat research and analysis for purposes of improving the strength of network security.
  • Assist with defining, testing and operating new ways of working with new technology solutions or processes supplied to the SOC team.
  • Participate in identification and delivery of Service Improvement Plans.
  • Proactively support business KPIs.
  • Work with the CyberClan global team when responding to security incidents.
  • Understand and comply with all Information Security policies.
  • Follow agreed security best practices and SOC processes
  • Interact with strategic incident response and threat intelligence vendors.
  • To undertake other responsibilities, training and tasks as reasonably requested by line management.
  • Undertake periodic assurance reviews and produce associated reporting as required.
  • Participate in CyberClan internal security awareness initiatives and other training requests
  • Responsible and accountable for ensuring all employment legislative requirements are adhered including equality, diversity and health and safety issues.
  • The job description may be altered at any time in line with the level of the post to meet changing requirements, but only in full consultation with the post holder.

Monthly Reporting & Communications

  • Deliver monthly security reports to assigned clients, highlighting key metrics, resolved incidents, and emerging threats
  • Create and present executive summaries of security incidents and resolution activities to client stakeholders
  • Conduct regular client briefings on threat landscape developments relevant to their industry sector
  • Maintain ongoing communications with client technical teams regarding security events requiring their attention

Client Onboarding & Relationship Management

  • Assist in client security environment documentation during the onboarding phase
  • Conduct knowledge transfer sessions to familiarize new clients with SOC processes and reporting procedures
  • Participate in the initial baseline creation of client environment to establish normal behavior patterns
  • Build relationships with client security teams to facilitate smoother incident response

Training & Knowledge Transfer

  • Develop and deliver training sessions for Tier 1 analysts on emerging threats and detection techniques
  • Create educational materials for clients on security best practices and threat awareness
  • Provide hands-on mentoring to junior SOC team members

Documentation & Process Development

  • Create and maintain incident response playbooks and runbooks for T1’s
  • Document detailed procedures for handling common security incidents within client environments
  • Contribute to the development of standard operating procedures for client engage

Required Skills and Experience

  • Educated to GCSE level or equivalent
  • Cyber Security Qualification (COMPTIA or equivalent experience)
  • ITIL Foundation

Preferred Skills, Experience, Degrees or Certifications

  • Previous experience in a similar position
  • Knowledge and experience of SOC tooling to identify threats.
  • Experience of collaboration tools
  • Keen analytical mind and approach
  • Proactively shares own expertise with others
  • Knowledge and experience of IT systems, networking and security threat landscape including:
  • Network fundamentals for example OSI stack, TCP/IP, DNS. HTTPS, firewall logs, packet capture and analysis.
  • Cloud technologies (AWS, Google Cloud, Azure)
  • Active Directory, Group Policies, PowerShell
  • Endpoint protection applications (Antivirus, Web Filtering, ATP, Encryption)
  • IDP/IPS Systems
  • SIEM tools (such as Splunk)
  • SOAR is an added advantage
  • Knowledge of malware capabilities, attack vectors and impact.
  • Knowledge of the MITRE ATT&CK framework to understand threat actors and how to mitigate them.
  • Knowledge and experience in threat analysis
  • Excellent interpersonal skills sufficient to develop professional relationships and rapport amongst key stakeholders
  • Strong team player
  • Genuine enthusiasm and drive to work within cyber security.
  • Excellent customer service skills
  • Good written skills to write explanations of systems, regulations and or procedures.
  • Good verbal communication
  • Ability to identify and suggest continual improvement
  • Good analytical and problem-solving skills
  • Ability to adapt to organizational change
  • Proven ability to manage varied workload
  • Ability to work unsupervised and under pressure.

Job Type

Full-time/Exempt

Location

100% Telecommuting

%of Travel Required

0-5%

Physical Requirements

Prolonged periods of sitting at a desk and working on a computer.

CyberClan is an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran, or disability status

Tier II SOC Analyst in Glasgow employer: CyberClan

CyberClan is an exceptional employer that fosters a dynamic and inclusive work culture, prioritising employee growth and development in the fast-paced field of cyber security. With a commitment to continuous learning and mentorship, team members are empowered to enhance their skills while contributing to meaningful projects that protect businesses globally. The fully remote work environment offers flexibility, allowing employees to balance their professional and personal lives effectively.
CyberClan

Contact Detail:

CyberClan Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Tier II SOC Analyst in Glasgow

✨Tip Number 1

Network like a pro! Attend industry events, webinars, or local meetups to connect with folks in the cyber security field. You never know who might have a lead on your dream job!

✨Tip Number 2

Get your hands dirty with practical experience. Volunteer for projects or internships that allow you to work on real-world security incidents. This will not only boost your skills but also make your CV shine!

✨Tip Number 3

Don’t just apply anywhere; focus on companies that excite you, like CyberClan! Use our website to find roles that match your skills and interests, and tailor your approach to show why you’re a perfect fit.

✨Tip Number 4

Prepare for interviews by brushing up on common SOC scenarios and incident response strategies. Practice articulating your thought process clearly, as communication is key in this field!

We think you need these skills to ace Tier II SOC Analyst in Glasgow

Cyber Security Qualification (COMPTIA or equivalent experience)
Knowledge of SOC tooling to identify threats
Analytical Skills
Knowledge of IT systems, networking and security threat landscape
Network fundamentals (OSI stack, TCP/IP, DNS, HTTPS, firewall logs, packet capture and analysis)
Cloud technologies (AWS, Google Cloud, Azure)
Active Directory, Group Policies, PowerShell
Endpoint protection applications (Antivirus, Web Filtering, ATP, Encryption)
IDP/IPS Systems
SIEM tools (such as Splunk)
Knowledge of malware capabilities, attack vectors and impact
Knowledge of the MITRE ATT&CK framework
Excellent interpersonal skills
Strong team player
Good written and verbal communication skills

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to the Tier II SOC Analyst role. Highlight relevant experience and skills that match the job description, like your knowledge of SOC tooling and incident response procedures.

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber security and how your background makes you a great fit for our team at CyberClan.

Show Off Your Skills: Don’t just list your qualifications; demonstrate them! Include specific examples of how you've tackled security incidents or contributed to team success in previous roles.

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands and shows us you’re serious about joining our team!

How to prepare for a job interview at CyberClan

✨Know Your Cyber Security Basics

Make sure you brush up on your knowledge of network fundamentals, SIEM tools, and the MITRE ATT&CK framework. Being able to discuss these topics confidently will show that you have a solid foundation in cyber security, which is crucial for a Tier II SOC Analyst.

✨Demonstrate Your Analytical Skills

Prepare to showcase your analytical mindset during the interview. You might be asked to solve hypothetical scenarios or analyse case studies. Practising how you approach problem-solving and articulating your thought process can really set you apart.

✨Familiarise Yourself with Incident Response Procedures

Since this role involves handling incidents, it’s essential to understand incident response playbooks and procedures. Be ready to discuss how you would handle specific incidents and what steps you would take to mitigate threats effectively.

✨Show Enthusiasm for Continuous Learning

Cyber security is always evolving, so express your eagerness to stay updated on the latest trends and technologies. Mention any recent courses, certifications, or self-study you've undertaken to demonstrate your commitment to professional growth.

Tier II SOC Analyst in Glasgow
CyberClan
Location: Glasgow

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>