SOC Analyst Level 2 in Birmingham

SOC Analyst Level 2 in Birmingham

Birmingham Full-Time 50000 - 65000 € / year (est.) No home office possible
Deepstreamtech

At a Glance

  • Tasks: Enhance security operations, develop playbooks, and optimise detection strategies.
  • Company: Join a leading cybersecurity firm focused on innovation and collaboration.
  • Benefits: Competitive salary, flexible hours, and opportunities for professional growth.
  • Other info: Dynamic work environment with mentorship opportunities and career advancement.
  • Why this job: Make a real impact in cybersecurity while working with cutting-edge technologies.
  • Qualifications: 3-5 years in IT security, SIEM expertise, and strong analytical skills.

The predicted salary is between 50000 - 65000 € per year.

This role requires deep expertise in SIEM platforms including Splunk, IBM QRadar, Microsoft Defender, Microsoft Sentinel, and Google Chronicle, with a strong focus on playbook development, analytical rule creation, and threat modelling. Must be able to obtain SC Clearance or already hold SC clearance.

SIEM Expertise:

  • Hands-on experience with at least two of the following: Splunk, IBM QRadar, Microsoft Defender for Endpoint, Microsoft Sentinel, Google Chronicle.
  • Strong knowledge of log formats, parsing, and normalization.
  • Experience with KQL, SPL, AQL, or other SIEM query languages.
  • Familiarity with scripting (Python, PowerShell) for automation and enrichment.
  • Deep understanding of threat detection, incident response, and cyber kill chain.
  • Familiarity with MITRE ATT&CK, NIST, and CIS frameworks.
  • Strong verbal and written English communication.
  • Strong interpersonal and presentation skills.
  • Strong analytical skills.
  • Good understanding of network traffic flows and ability to understand normal and suspicious activities.
  • Good understanding of Vulnerability Scanning and management as well as Ethical Hacking (Penetration Testing).
  • Knowledge of ITIL disciplines such as Incident, Problem and Change Management.
  • Ability to work with minimal levels of supervision.
  • Willingness to work in a job that involves 24/7 on call.
  • Minimum of 3 to 5 years of experience in the IT security industry, preferably working in a SOC/NOC environment.
  • Preferably holds Cyber Security Certification e.g. ISC2 CISSP, GIAC, SC-200, Splunk Certified Admin/Power User, IBM QRadar Certified Specialist, Google Chronicle Security Engineer etc.
  • Experience with Service Now Security suite.
  • Experience with Cloud platforms (AWS and/or Microsoft Azure).
  • Excellent knowledge of Microsoft Office products, especially Excel and Word.

What the job involves:

  • The primary function of the Senior SOC Engineer is to enhance our security operations capabilities.
  • You will be instrumental in building and optimizing our detection and response strategies.
  • Deploy, configure, and maintain SIEM platforms (Splunk, QRadar, Sentinel, Defender, Chronicle).
  • Onboard and normalize log sources across cloud and on-prem environments.
  • Develop and optimize analytical rules for threat detection, anomaly detection, and behavioural analysis.
  • Design and implement incident response playbooks for various threat scenarios (e.g., phishing, lateral movement, data exfiltration).
  • Integrate playbooks with SOAR platforms (e.g., Microsoft Logic Apps, XSOAR) to automate triage and response.
  • Continuously refine playbooks based on threat intelligence and incident feedback.
  • Monitor and analyse security alerts and events to identify potential threats.
  • Perform in-depth investigations and coordinate incident response activities.
  • Collaborate with threat intelligence teams to enrich detection logic.
  • Conduct threat modelling exercises using frameworks like MITRE ATT&CK, STRIDE, or Kill Chain.
  • Translate threat models into actionable detection use cases and SIEM rules.
  • Prioritise detection engineering efforts based on risk and business impact.
  • Generate reports and dashboards for stakeholders on security posture and incident trends.
  • Work closely with IT, DevOps, and compliance teams to ensure secure system configurations.
  • Provide mentorship and guidance to junior analysts and engineers.
  • Maintain accurate and up-to-date documentation of security procedures, incident response plans, and analysis reports.
  • Support the creation of monthly reporting packs as per contractual requirements.
  • Create and document robust event and incident management processes, Runbooks & Playbooks.
  • Involvement in scoping and standing up new solutions for new opportunities.
  • Assisting Pre-Sales team with requirements on new opportunities.
  • Demonstrations of SOC tools to clients.
  • Continual Service Improvement - Recommendations for change to address incidents or persistent events.

SOC Analyst Level 2 in Birmingham employer: Deepstreamtech

As a SOC Analyst Level 2, you will join a dynamic and innovative team dedicated to enhancing security operations in a collaborative environment. Our company prioritises employee growth through continuous training and mentorship, ensuring you stay at the forefront of cybersecurity advancements. Located in a vibrant area, we offer a supportive work culture that values work-life balance and provides unique opportunities for professional development, making us an excellent employer for those seeking meaningful and rewarding careers in IT security.

Deepstreamtech

Contact Detail:

Deepstreamtech Recruiting Team

StudySmarter Expert Advice🤫

We think this is how you could land SOC Analyst Level 2 in Birmingham

Tip Number 1

Network, network, network! Get out there and connect with professionals in the cybersecurity field. Attend meetups, webinars, or conferences related to SOC roles. You never know who might have a lead on your dream job!

Tip Number 2

Show off your skills! Create a portfolio showcasing your experience with SIEM platforms like Splunk or QRadar. Include examples of playbooks you've developed or analytical rules you've created. This will give potential employers a taste of what you can bring to the table.

Tip Number 3

Don’t just apply blindly! Tailor your approach for each job. Research the company and mention how your skills align with their specific needs in your conversations. This shows you're genuinely interested and not just sending out generic applications.

Tip Number 4

Apply through our website! We’ve got a streamlined process that makes it easy for you to showcase your talents. Plus, it gives us a chance to see your application in the best light possible. Don’t miss out on that opportunity!

We think you need these skills to ace SOC Analyst Level 2 in Birmingham

SIEM Expertise
Splunk
IBM QRadar
Microsoft Defender for Endpoint
Microsoft Sentinel
Google Chronicle
Playbook Development

Some tips for your application 🫡

Show Off Your SIEM Skills:Make sure to highlight your hands-on experience with SIEM platforms like Splunk or QRadar. We want to see how you've used these tools in real-world scenarios, so don’t hold back on the details!

Tailor Your Application:Take a moment to customise your application for this role. Use keywords from the job description and relate your past experiences to the specific requirements we’ve listed. It shows us you’re genuinely interested!

Be Clear and Concise:When writing your application, keep it clear and to the point. We appreciate strong communication skills, so make sure your writing reflects that. Avoid jargon unless it’s relevant to the role!

Apply Through Our Website:We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it’s super easy!

How to prepare for a job interview at Deepstreamtech

Know Your SIEM Inside Out

Make sure you’re well-versed in the SIEM platforms mentioned in the job description, especially Splunk and QRadar. Brush up on your playbook development and analytical rule creation skills, as these will likely come up during the interview.

Show Off Your Scripting Skills

Since scripting is a key part of this role, be prepared to discuss your experience with Python or PowerShell. Maybe even bring along a small script you've written to demonstrate your automation capabilities.

Understand Threat Modelling

Familiarise yourself with frameworks like MITRE ATT&CK and NIST. Be ready to explain how you’ve used these in past roles to enhance threat detection and incident response strategies.

Communicate Clearly and Confidently

Strong verbal and written communication skills are essential. Practice explaining complex security concepts in simple terms, as you may need to present your ideas to non-technical stakeholders during the interview.