At a Glance
- Tasks: Join our team to combat cyber threats and manage security incidents daily.
- Company: Genesis Communications is a leading IT services company, specialising in Internet Data Centers.
- Benefits: Enjoy flexible working hours, career development opportunities, and a dynamic work environment.
- Why this job: Make a real impact in cybersecurity while growing your skills in a supportive team culture.
- Qualifications: BSc or equivalent in Cyber Security, with 5+ years of SOC analyst experience required.
- Other info: Fluency in Chinese and English is essential; shift work may be required.
The predicted salary is between 36000 - 60000 £ per year.
The Security Operations team exists to protect the client by proactively detecting and responding to cyber security threats.
Working as a member of a growing team, you will provide defence against cyber-attacks and play a vital role in the monitoring, analysis and management of security events / incidents emanating from client networks and systems. This is a hands-on operational role where you will be deeply involved in day-to-day incidents using your broad experience to combat threats and resolve incidents in a timely manner.
This role requires willingness to work shifts (including unsociable hours and bank holidays where these fall into your shift pattern) as part of a 24×7 team.
Principal Duties and Responsibilities
• Responsible for providing Tier 2 case resolution, resolving complex security cases including generating initial reporting, providing follow-ups and requesting information and resolution activity.
• Day to day incident tirage and escalation using contextual and threat intelligence
• Responsible for providing security expertise to escalated incidents
• Act as the incident handler for P1/P2 incidents
• Provide and support In-depth SIEM and Incident notification toolset administration and configuration
• Fully utilize threat intelligence capabilities for proactive threat hunting
• Responsible for providing communication directly with customers regarding security incidents and other related topics.
• Aid in the development of incident response procedures and playbooks
• Contribute to the design and development of defence and response strategies, knowledge base and playbooks.
• Monitoring SIEM alerts effectively to minimize downtime and restore services.
• Ensure investigation steps are clearly documented and accurately escalated when needed.
• Responsible for producing and maintaining documentation relevant to both the SOC and position.
• Responsible for updating and offering continual improvement to the knowledge base.
• Support the SOC team research global security events, issues and trends to produce security advisories for customers based on findings.
• Responsible for managing and configuring security monitoring tools.
• Investigating intrusion attempts and performing in-depth exploit analysis.
• Provide analytical feedback on client network traffic patterns.
• Provide analytical feedback related to malware and other network threats.
• Accept, manage and update service requests and incidents to ensure contracted Service Level Agreements are met.
• Guiding, coaching and mentoring analysts who are providing the core SOC functions, including but not limited to, alert triage, incident escalation, content creation etc.
Generic Duties and Responsibilities
• To continuously develop both technical and personal skills required within the role and assist with development of other staff.
• Keep up to date on security developments and news
• Conducting cyber threat research and analysis for purposes of improving the strength of network security.
• Assist with defining, testing and operating new ways of working with new technology solutions or processes supplied to the SOC team.
• Participate in identification and delivery of Service Improvement Plans.
• Proactively support business KPIs.
• Understand and comply with all Information Security policies.
• Follow agreed security best practices and SOC processes
• Interact with strategic incident response and threat intelligence vendors.
• To undertake other responsibilities, training and tasks as reasonably requested by line management.
• Undertake periodic assurance reviews and produce associated reporting as required.
• Participate in internal security awareness initiatives and other training requests
• Responsible and accountable for ensuring all employment legislative requirements are adhered including equality, diversity and health and safety issues.
• The job description may be altered at any time in line with the level of the post to meet changing requirements, but only in full consultation with the post holder.
Requirements
Qualifications:
Educated to BSc level, or equivalent
Cyber Security Qualification (COMPTIA or equivalent experience)
ITIL Foundation
5 year+ SOC analyst experiences
Skills, Knowledge and Experience:
Previous experience in a similar position
Knowledge and experience of SOC tooling to identify threats.
Experience of collaboration tools
Keen analytical mind and approach
Proactively shares own expertise with others
Knowledge and experience of IT systems, networking and security threat landscape including:
Network fundamentals for example OSI stack, TCP/IP, DNS. HTTPS, firewall logs, packet capture and analysis.
Cloud technologies (AWS, Google Cloud, Azure)
Anti-Malware / Endpoint protection applications (Antivirus, Web Filtering, ATP, Encryption,Microsoft Defender ATP, FireEye, CrowdStrike)
SOAR is an added advantage
Knowledge of malware capabilities, attack vectors and impact.
Knowledge of the MITRE ATT&CK framework to understand threat actors and how to mitigate them.
Knowledge and experience in threat analysis.
Vulnerability Management
Threat Hunting and Threat Intelligence (MITRE ATT&CK)
Penetration Testing
Programming (Python, or other languages)
Personal Qualities:
Excellent interpersonal skills sufficient to develop professional relationships and rapport amongst key stakeholders
Strong team player
Genuine enthusiasm and drive to work within cyber security.
Good written skills to write explanations of systems, regulations and or procedures.
Ability to identify and suggest continual improvement
Good analytical and problem-solving skills
Ability to adapt to organizational change
Proven ability to manage varied workload
Ability to work unsupervised and under pressure.
Language:
Fluent Chinese and English
About the Company
Genesis Communications Limited, established in 2019 and headquartered in London, is a leading IT information services company with a global workforce partnership approach. Specializing in Internet Data Centers (IDC), we collaborate with key facilities such as Digital Realty, Telehouse, ARK Datacentre, Equinix, delivering end-to-end solutions in design, supply, installation, and commissioning.
Beyond IDC, we offer unparalleled recruitment and workforce solutions, guiding professionals in their careers and helping organizations bridge skills gaps. What sets us apart is our commitment to providing insights and expertise for the fast-paced world of work.
At Genesis Communications Limited, we pride ourselves on a proven track record in IDC contracting and a dedication to delivering exceptional solutions. As your reliable partner, we not only address current needs but also help you prepare for the future. Trust us to navigate the dynamic landscape of IT information services and workforce solutions with you.
#J-18808-Ljbffr
Tier 2 SOC Analyst employer: Genesis Communications Ltd
Contact Detail:
Genesis Communications Ltd Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Tier 2 SOC Analyst
✨Tip Number 1
Familiarise yourself with the MITRE ATT&CK framework. Understanding this will not only help you in identifying threat actors but also in demonstrating your knowledge during interviews, showing that you're proactive about threat intelligence.
✨Tip Number 2
Engage with online communities and forums related to cybersecurity. Networking with professionals in the field can provide insights into the latest trends and may even lead to referrals for job openings at companies like us.
✨Tip Number 3
Stay updated on the latest security developments and news. Being able to discuss recent incidents or advancements in technology during your interview will demonstrate your genuine enthusiasm and commitment to the field.
✨Tip Number 4
Practice your incident response skills through simulations or labs. This hands-on experience will prepare you for the practical aspects of the role and give you concrete examples to discuss during your interview.
We think you need these skills to ace Tier 2 SOC Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience and skills that align with the Tier 2 SOC Analyst role. Emphasise your knowledge of SOC tooling, incident handling, and any specific technologies mentioned in the job description.
Craft a Strong Cover Letter: Write a cover letter that showcases your passion for cyber security and your understanding of the role. Mention specific experiences where you've successfully handled security incidents or contributed to threat analysis.
Highlight Relevant Qualifications: Clearly list your qualifications, such as your BSc degree or equivalent Cyber Security certifications. If you have ITIL Foundation or experience with the MITRE ATT&CK framework, make sure to include these details prominently.
Showcase Soft Skills: In addition to technical skills, highlight your interpersonal skills and ability to work under pressure. Provide examples of how you've collaborated with teams or mentored others in previous roles.
How to prepare for a job interview at Genesis Communications Ltd
✨Showcase Your Technical Skills
Make sure to highlight your experience with SOC tooling, threat analysis, and incident response during the interview. Be prepared to discuss specific tools you've used, such as SIEM systems or anti-malware applications, and how you've applied them in real-world scenarios.
✨Demonstrate Your Problem-Solving Abilities
Prepare examples of complex security incidents you've handled in the past. Discuss your thought process and the steps you took to resolve these issues, showcasing your analytical skills and ability to work under pressure.
✨Familiarise Yourself with the Company
Research Genesis Communications Limited and understand their role in the IT information services sector. Knowing their focus on Internet Data Centers and workforce solutions will help you tailor your responses and show genuine interest in the company.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your incident handling and threat detection capabilities. Practice articulating your approach to various situations, such as responding to a P1 incident or conducting threat hunting, to demonstrate your readiness for the role.