At a Glance
- Tasks: Monitor security alerts, investigate incidents, and enhance security measures in a dynamic SOC team.
- Company: Join a leading Managed Security Service Provider with a strong track record since 2004.
- Benefits: Enjoy a competitive salary, hybrid working, and opportunities for rapid career advancement.
- Why this job: Make a real impact in cybersecurity while enjoying a flexible work-life balance.
- Qualifications: 1-2 years in a SOC or relevant IT role; familiarity with key security tools is a plus.
- Other info: Work in a supportive environment with a history of promoting from within.
The predicted salary is between 24000 - 26000 £ per year.
Join a Managed Security Service Provider (MSSP), that has been securing businesses globally since 2004. Initially a SIEM company, they evolved to offer managed services 12 years ago, driven by client demand for better staff retention. With an agile and dynamic team, they have maintained long-term client relationships, with their first client still with them after a decade. Their team members thrive here, with opportunities for rapid advancement. Clients span various sectors primarily in the UK, with growing interests in France, Germany, the Middle East, and the United States.
We are seeking both Graduate and Experienced Security Analysts to join the SOC team. The role involves working with Elastic, Sentinel, Defender, and occasionally Splunk. Analysts must be SC & NPPV3 cleared or capable of obtaining these clearances. This role sits within a 24/7 SOC environment and follows a rotating 12-hour shift pattern (days and nights). The schedule alternates between three and four shifts per week, providing regular time off. All night shifts are fully remote, and day shifts that fall outside UK business hours can also be worked from home, offering a flexible and balanced working setup.
If you are interested in this opportunity, get in touch and apply today.
Responsibilities:- Monitor and analyse security alerts using SIEM tools.
- Investigate and respond to security incidents.
- Collaborate with team members to enhance security measures.
- Provide detailed reports on security events and trends.
- Assist in maintaining and improving SOC operations.
- 1-2 years of experience in a SOC or relevant IT infrastructure role.
- Proficiency in AD, Intune, and general IT infrastructure.
- Experience with Elastic, Sentinel, Defender, and Splunk is desirable.
- Be part of a company with a proven track record and long-term client relationships.
- Work in a supportive and agile environment where good performance is recognised and rewarded.
- Benefit from a hybrid working policy that supports work-life balance.
- Join a team with a history of progression; many have advanced from entry-level to senior positions.
L1 SOC Analyst - MSSP in Birmingham employer: Hamilton Barnes Associates Limited
Contact Detail:
Hamilton Barnes Associates Limited Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land L1 SOC Analyst - MSSP in Birmingham
✨Tip Number 1
Network like a pro! Reach out to current employees on LinkedIn or attend industry events. A friendly chat can give you insider info and maybe even a referral!
✨Tip Number 2
Prepare for the interview by brushing up on your technical skills. Make sure you can talk confidently about SIEM tools like Elastic and Sentinel, as well as your experience in SOC roles.
✨Tip Number 3
Show your passion for cybersecurity! Share your thoughts on recent security trends or incidents during interviews. It’ll show you’re engaged and ready to contribute to the team.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who take that extra step!
We think you need these skills to ace L1 SOC Analyst - MSSP in Birmingham
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the L1 SOC Analyst role. Highlight your experience with SIEM tools like Elastic and Sentinel, and don’t forget to mention any relevant IT infrastructure skills. We want to see how you fit into our dynamic team!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cybersecurity and how your background makes you a great fit for our MSSP. Keep it engaging and personal – we love to see your personality come through!
Showcase Your Skills: In your application, be sure to showcase your technical skills and any relevant certifications. If you've got experience with AD, Intune, or have worked in a SOC before, let us know! We’re looking for candidates who can hit the ground running.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets to us quickly and efficiently. Plus, you’ll find all the details about the role and our company culture there!
How to prepare for a job interview at Hamilton Barnes Associates Limited
✨Know Your Tools
Familiarise yourself with the SIEM tools mentioned in the job description, like Elastic, Sentinel, and Defender. Be ready to discuss your experience with these tools and how you've used them in past roles or projects.
✨Understand the SOC Environment
Research what a 24/7 SOC environment entails. Be prepared to talk about how you would handle shift work and the importance of teamwork in monitoring and responding to security incidents.
✨Showcase Your Problem-Solving Skills
Prepare examples of how you've investigated and resolved security incidents in the past. Highlight your analytical skills and your ability to provide detailed reports on security events.
✨Emphasise Adaptability
Since the company values agility and dynamic teamwork, be ready to discuss how you've adapted to changes in previous roles. Share experiences where you've collaborated with others to enhance security measures or improve operations.