At a Glance
- Tasks: Join a dynamic SOC team, leading cyber incident management and proactive threat hunting.
- Company: Work for a top IT company known for its exceptional talent and cutting-edge technology.
- Benefits: Enjoy flexible working, top training, and certification programmes with a 'people first' culture.
- Why this job: Grow your career in cyber security with the best consultants and technology in a supportive environment.
- Qualifications: 4+ years in a SOC, experience with SIEM tools, and relevant cyber security certifications required.
- Other info: Candidates must be eligible for SC clearance; 4 days on, 4 days off shift pattern.
The predicted salary is between 46200 - 57800 ÂŁ per year.
My client is one of the most recognisable names in IT and has some of the best people in the industry working for them. They’re top partners with all the top vendors, which means you get to work with the best technology, the best people, the best training, the best certification programmes, and the best environment to grow!
Why?:
- Work with some of the best cyber consultants in the country.
- The pathway to do whatever you want in cyber is continuous.
- “People first” culture.
- The latest, cutting-edge technology.
You will join a 24/7 SOC team, involved in the highest level of Incident Response activities, proactive threat hunting, and development of detection and use-case capabilities. You’ll be working alongside the engineering team to help find tuning optimisation opportunities.
Candidates MUST have or be eligible to gain SC clearance upon hire.
Key Skills required:
- 4+ years’ experience working in a SOC environment – ideally MSSP.
- Experience in a technical security role is also considered.
- Experience with SIEM tools, such as MS Sentinel, Alien Vault, or Splunk.
- A cyber security qualification, certification, or degree e.g. CySA+, CompTIA SEC+, or similar experience. Microsoft SC-200 Certs are desirable.
- Excellent communication skills.
- A strong knowledge of sophisticated threat actor methodologies, along with experience in incident response and forensic investigations.
This business has a clear picture of where they want to be, has the right individuals steering the ship, and exceptional tech talent leading the way. Impressive customers, flexible working, and a company that truly cares.
Responsibilities:
- Leading escalated Cyber Incident Management, including Major Incidents and 3rd line analysis for ongoing investigations.
- Carrying out proactive threat hunts, RCAs, creation of detection capabilities.
- Monitor/hunt security alerts from security platforms (SIEM platforms, such as MS Sentinel, Alien Vault, or Splunk).
- Act on Second Line security alerts, incidents, requests, and events to ensure that threats, vulnerabilities, and breaches are managed for successful resolution.
- Document and manage cases to utilise information for customer reports, to provide insightful and intelligent recommendations.
- Facilitate recovery, following the resolution of incidents.
- Provide subject matter expertise regarding exploits, threat actors, TTPs, etc.
- Maintain high quality across SLA’s and KPI’s.
Please hit the button to Apply and/or email Harley.robertson@infraview.co.uk or call on 020 3004 8235 for further info.
L3 SOC / Cyber Security Engineer - Threat Hunter / SIEM Sentinel employer: InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
Contact Detail:
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land L3 SOC / Cyber Security Engineer - Threat Hunter / SIEM Sentinel
✨Tip Number 1
Network with professionals in the cyber security field, especially those who work in SOC environments. Attend industry events or webinars to connect with potential colleagues and learn about their experiences. This can give you insights into the company culture and what they value in candidates.
✨Tip Number 2
Familiarise yourself with the specific SIEM tools mentioned in the job description, such as MS Sentinel, Alien Vault, or Splunk. Consider setting up a home lab to practice using these tools, which will not only enhance your skills but also demonstrate your initiative and commitment to potential employers.
✨Tip Number 3
Stay updated on the latest trends and threats in cyber security. Follow relevant blogs, podcasts, and forums to understand current methodologies and threat actor behaviours. This knowledge will help you during interviews and show that you are proactive in your professional development.
✨Tip Number 4
Prepare for technical interviews by practising common incident response scenarios and threat hunting techniques. You might be asked to solve real-world problems or case studies, so being well-prepared can set you apart from other candidates. Use mock interviews to refine your communication skills as well.
We think you need these skills to ace L3 SOC / Cyber Security Engineer - Threat Hunter / SIEM Sentinel
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your relevant experience in a SOC environment, particularly any work with SIEM tools like MS Sentinel, Alien Vault, or Splunk. Emphasise your cyber security qualifications and certifications, as well as your communication skills.
Craft a Strong Cover Letter: In your cover letter, express your enthusiasm for the role and the company. Mention specific experiences that demonstrate your ability to lead escalated Cyber Incident Management and your proactive approach to threat hunting.
Showcase Technical Skills: Clearly outline your technical skills related to incident response, forensic investigations, and knowledge of threat actor methodologies. Use specific examples to illustrate your expertise and how it aligns with the job requirements.
Proofread Your Application: Before submitting, carefully proofread your application materials for any spelling or grammatical errors. A polished application reflects your attention to detail, which is crucial in the cyber security field.
How to prepare for a job interview at InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
✨Showcase Your Technical Skills
Be prepared to discuss your experience with SIEM tools like MS Sentinel, Alien Vault, or Splunk. Highlight specific instances where you've used these tools in a SOC environment, and be ready to explain your approach to threat hunting and incident response.
✨Demonstrate Communication Skills
Since excellent communication is key for this role, practice articulating complex technical concepts in a clear and concise manner. You might be asked to explain your thought process during an incident response, so ensure you can convey your ideas effectively.
✨Understand the Company Culture
Research the company's 'people first' culture and be ready to discuss how you align with their values. Share examples of how you've contributed to a positive team environment or supported colleagues in previous roles.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your problem-solving skills in real-time situations. Think about past incidents you've managed and be ready to walk through your decision-making process, including any challenges you faced and how you overcame them.