At a Glance
- Tasks: Join a dynamic team to monitor and respond to cybersecurity incidents.
- Company: Be part of a leading organisation focused on enhancing employee tech experiences.
- Benefits: Enjoy hybrid working, competitive salary, and generous leave entitlements.
- Why this job: Make a real impact in cybersecurity while growing your skills in a collaborative environment.
- Qualifications: Experience as a SOC Analyst with knowledge of security operations and frameworks required.
- Other info: Security Clearance is necessary; sponsorship is not available.
The predicted salary is between 46000 - 57000 £ per year.
As a key part of the IT Operations team and sitting within the wider DDaT function, your new team delivers, provides, manages, and supports critical IT services across the organisation and owns and defines the employee experience across all technology for both internal and external stakeholders' use, to enable greater productivity throughout the organisation. You'll be joining a team of collaborators and knowledge sharers working in an agile, fast-paced environment.
As a SOC Analyst, you'll be responsible for working with colleagues in DDaT, Departmental Security and Resilience Team, other departments and third-party suppliers as part of a small team of internal SOC analysts. You'll collaborate with cross-functional teams to detect, analyse, and respond to potential security incidents, ensuring the protection of data and information systems. Your expertise in cybersecurity, team skills and deep technical knowledge will be essential in identifying emerging threats, supporting the implementation of effective security measures, and maintaining the highest standard of cybersecurity within the organisation.
You'll help build and implement the SOC within IT operations, conduct daily operations of the internal SOC including incident monitoring, analysis, and response, implement SOC procedures and best practice to ensure efficient and effective incident response, and support major incident response efforts and lead on incident response efforts including containment, investigation, analysis, and reporting of security incidents.
Your profile:
- Experience as a SOC Analyst in an enterprise scale organisation; managing security operations incidents and events
- Hands-on knowledge and experience of security operations and incident response planning; Cellebrite, Magnet Domain Tools
- Knowledge of cybersecurity principles and frameworks; ISO27001, NIST, GDPR etc.
- Knowledge and experience with MS Sentinel, Cisco Meraki, MS Defender, Endpoint protection
- Knowledge and experience with SIEM, IDS/IPS, firewalls, endpoint protection systems, and vulnerability management
- Knowledge and experience analysing and interpreting security logs, event data, and alerts to identify potential threats
- Knowledge and experience of network protocols, traffic analysis, and cyber-attack methodologies
- Knowledge and experience of threat intelligence, risk management, vulnerability management, and penetration testing
Please note sponsorship is not available for this position, and you must be able to obtain a Security Clearance. Your new employer is looking for candidates who want to further their career, alongside delivering great services for all end users. As an employer of choice, you will be offered an extensive benefits package including:
- Competitive salary package between £46,000- £57,000 dependent on experience
- 25 days' annual leave entitlement plus bank holidays
- Great pension scheme with substantial employer contribution
- Hybrid working- 2 days onsite in central London
- Season ticket loans, cycle to work schemes, employee assistance programmes
- Leave for professional and academic studies, and excellent opportunities for continued development
- A healthy work-life balance for all employees with a strong flexible working culture
Contact Detail:
Hays Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Analyst
✨Tip Number 1
Familiarise yourself with the specific tools and technologies mentioned in the job description, such as MS Sentinel and Cisco Meraki. Having hands-on experience or even a basic understanding of these tools can set you apart during interviews.
✨Tip Number 2
Network with current SOC Analysts or professionals in the cybersecurity field. Engaging with them on platforms like LinkedIn can provide insights into the role and may even lead to referrals, which can significantly boost your chances of landing the job.
✨Tip Number 3
Stay updated on the latest cybersecurity trends and threats. Being knowledgeable about recent incidents or emerging threats can demonstrate your passion for the field and your proactive approach to security.
✨Tip Number 4
Prepare for potential scenario-based questions during the interview. Think about how you would respond to specific security incidents or challenges, as this will showcase your problem-solving skills and technical expertise.
We think you need these skills to ace SOC Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience as a SOC Analyst, particularly in enterprise-scale organisations. Emphasise your hands-on knowledge of security operations, incident response planning, and familiarity with tools like Cellebrite and Magnet Domain Tools.
Craft a Strong Cover Letter: In your cover letter, express your enthusiasm for the role and the organisation. Mention specific cybersecurity principles and frameworks you are familiar with, such as ISO27001 and NIST, and how your skills align with the job requirements.
Showcase Technical Skills: Highlight your technical expertise in your application. Include your experience with SIEM, IDS/IPS, firewalls, and endpoint protection systems. Be specific about your ability to analyse security logs and interpret event data to identify potential threats.
Demonstrate Collaboration Experience: Since the role involves working with cross-functional teams, provide examples of past experiences where you collaborated effectively with colleagues or third-party suppliers. This will show your ability to work in an agile, fast-paced environment.
How to prepare for a job interview at Hays
✨Showcase Your Technical Expertise
Be prepared to discuss your hands-on experience with security operations and incident response. Highlight specific tools you've used, such as MS Sentinel or Cisco Meraki, and be ready to explain how you've applied cybersecurity principles in real-world scenarios.
✨Demonstrate Collaboration Skills
As a SOC Analyst, you'll work closely with various teams. Share examples of how you've successfully collaborated with cross-functional teams in the past, focusing on your communication skills and ability to work in an agile environment.
✨Understand the Organisation's Security Frameworks
Familiarise yourself with relevant cybersecurity frameworks like ISO27001 and NIST. During the interview, express your understanding of these frameworks and how they can be applied to enhance the organisation's security posture.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your problem-solving abilities in real-time incidents. Practice articulating your thought process when responding to potential security threats, including containment and investigation strategies.