At a Glance
- Tasks: Join a dynamic SOC team tackling cyber incidents and proactive threat hunting.
- Company: Work for a leading IT firm known for its top-tier talent and technology.
- Benefits: Enjoy flexible working, cutting-edge tech, and continuous training opportunities.
- Why this job: Be part of a 'people first' culture with a clear growth pathway in cybersecurity.
- Qualifications: 2+ years in a SOC environment, experience with SIEM tools, and relevant certifications required.
- Other info: 4 days on, 4 days off shift pattern; SC clearance eligibility needed.
The predicted salary is between 52000 - 78000 ÂŁ per year.
My client is one of the most recognisable names in IT and has some of the best people in the industry working for them. They’re top partners with all the top vendors, which means you get to work with the best technology, the best people, the best training, the best certification programmes, and the best environment to grow!
Why?:
- Work with some of the best cyber consultants in the country.
- The pathway to do whatever you want in cyber is continuous.
- “People first” culture.
- The latest, cutting-edge technology.
You will join a 24/7 SOC team, involved in the highest level of Incident Response activities, proactive threat hunting, and development of detection and use-case capabilities. You’ll be working alongside the engineering team to help find tuning optimisation opportunities.
Candidates MUST have or be eligible to gain SC clearance upon hire.
Key Skills required:
- 2+ years’ experience working in a SOC environment – ideally MSSP.
- Experience in a technical security role is also considered.
- Experience with SIEM tools, such as MS Sentinel, Alien Vault, or Splunk.
- A cyber security qualification, certification, or degree e.g. CySA+, CompTIA SEC+, or similar experience. Microsoft SC-200 Certs are desirable.
- Excellent communication skills.
- A strong knowledge of sophisticated threat actor methodologies, along with experience in incident response and forensic investigations.
This business has a clear picture of where they want to be, has the right individuals steering the ship, and exceptional tech talent leading the way. Impressive customers, flexible working, and a company that truly cares.
Responsibilities:
- Leading escalated Cyber Incident Management, including Major Incidents and 2nd/3rd line analysis for ongoing investigations.
- Carrying out proactive threat hunts, RCAs, creation of detection capabilities.
- Monitor/hunt security alerts from security platforms (SIEM platforms, such as MS Sentinel, Alien Vault, or Splunk).
- 4 days on, 4 days off – days and nights rota.
- Act on Second Line security alerts, incidents, requests, and events to ensure that threats, vulnerabilities, and breaches are managed for successful resolution.
- Document and manage cases to utilise information for customer reports, to provide insightful and intelligent recommendations.
- Facilitate recovery, following the resolution of incidents.
- Provide subject matter expertise regarding exploits, threat actors, TTPs, etc.
- Maintain high quality across SLA’s and KPI’s.
For more info, please call 020 3004 8235 or email jimmy.hearne@infraview.co.uk.
Senior Security Analyst (England) employer: InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
Contact Detail:
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior Security Analyst (England)
✨Tip Number 1
Network with professionals in the cybersecurity field, especially those who work in SOC environments. Attend industry events, webinars, or local meetups to connect with potential colleagues and learn about their experiences. This can give you insights into the company culture and the specific skills they value.
✨Tip Number 2
Familiarise yourself with the latest trends and technologies in cybersecurity, particularly around SIEM tools like MS Sentinel, Alien Vault, and Splunk. Consider joining online forums or communities where these topics are discussed to stay updated and demonstrate your knowledge during interviews.
✨Tip Number 3
Prepare for technical interviews by practising common incident response scenarios and threat hunting techniques. You might be asked to solve real-world problems, so being able to articulate your thought process and approach will set you apart from other candidates.
✨Tip Number 4
Showcase your communication skills by engaging in discussions about complex security topics in a clear and concise manner. Being able to explain technical concepts to non-technical stakeholders is crucial in a SOC role, so practice articulating your thoughts effectively.
We think you need these skills to ace Senior Security Analyst (England)
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience in a SOC environment, particularly any roles in MSSP. Emphasise your familiarity with SIEM tools like MS Sentinel, Alien Vault, or Splunk, and include any relevant certifications such as CySA+ or CompTIA SEC+.
Craft a Strong Cover Letter: In your cover letter, express your enthusiasm for the role and the company. Mention specific experiences that demonstrate your skills in incident response and threat hunting, and how they align with the responsibilities outlined in the job description.
Highlight Communication Skills: Given the importance of communication in this role, ensure you provide examples of how you've effectively communicated complex security issues in previous positions. This could be through reports, presentations, or team collaborations.
Showcase Continuous Learning: Mention any ongoing training or certifications you are pursuing, especially those related to cyber security. This shows your commitment to professional development and aligns with the company's focus on growth and training.
How to prepare for a job interview at InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
✨Showcase Your Technical Skills
Make sure to highlight your experience with SIEM tools like MS Sentinel, Alien Vault, or Splunk. Be prepared to discuss specific incidents where you used these tools effectively, as this will demonstrate your hands-on expertise.
✨Demonstrate Communication Skills
Since excellent communication is a key requirement, practice explaining complex security concepts in simple terms. This will show that you can convey important information clearly, which is crucial in a SOC environment.
✨Prepare for Scenario-Based Questions
Expect questions that assess your incident response capabilities. Prepare to discuss past experiences where you managed major incidents or conducted threat hunts, detailing your thought process and actions taken.
✨Research the Company Culture
Familiarise yourself with the company's 'people first' culture and their commitment to employee growth. Be ready to discuss how you align with these values and how you can contribute to their positive work environment.