At a Glance
- Tasks: Monitor and respond to security incidents in a fast-paced environment.
- Company: Join a leading organization focused on cybersecurity solutions.
- Benefits: Enjoy 12-hour shifts with potential for career growth and skill development.
- Why this job: Be part of a critical mission to protect networks and gain hands-on experience.
- Qualifications: 3+ years in SOC or security analysis, with active security clearance required.
- Other info: Work on-site in Stevenage, collaborating with a dynamic team.
The predicted salary is between 42000 - 84000 £ per year.
Job Description
Job Title: SOC Analyst
Location: Stevenage – Full-time onsite
Shift Pattern: 24/7 Desk, 4 on 4 off – Days & Nights
Clearance Requirements:
- Ideally SC/DV Cleared – Must be eligible for clearance
Role Overview
We are seeking a motivated SOC Analyst to join our team in Stevenage, working full-time onsite in a dynamic 24/7 Security Operations Centre environment. This role involves monitoring, detecting, analyzing, and responding to cybersecurity incidents using a wide range of security tools and platforms.
Key Requirements
- Hands-on experience with LogRhythm, Splunk, Darktrace (Threat Visualizer), and FireEye technologies (EX, NX, HX, CMS).
- Solid understanding of the OSI Reference Model and key network communication protocols such as DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S.
- Practical experience in incident response, log analysis, and packet capture (PCAP) analysis.
- Familiarity with attack vectors including phishing, port scanning, web application attacks, DDoS, and lateral movement techniques.
- Working knowledge of Windows and/or Linux operating systems, including how to identify indicators of compromise.
- Proven ability to investigate and document security alerts and incidents in a clear and concise manner for both technical and non-technical stakeholders.
- Capable of tracking and managing complex remediation activities, delivering clear updates to customers.
- Able to articulate cybersecurity risks in the context of business impact and recommend appropriate remedial actions.
- Collaborative mindset, with experience in team-based environments and stakeholder reporting.
- Prior experience handling security incidents on behalf of customers or internal teams.
- Familiarity with defensive cyber methodologies and frameworks.
- Foundational scripting knowledge (e.g., Python, PowerShell) is advantageous.
- Strong verbal and written communication skills are essential.
Desirable Skills
- Knowledge or exposure to tools such as:
- ObserveIT
- Symantec MessageLabs
- IronPort
- Splunk Phantom
- Recorded Future
-
This is an excellent opportunity to grow your cybersecurity career in a hands-on, fast-paced environment. If you meet the criteria and are looking for your next challenge, we’d love to hear from you
Security Operations Center Analyst employer: Jumar
Contact Detail:
Jumar Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Operations Center Analyst
✨Tip Number 1
Make sure to highlight your experience with the specific tools mentioned in the job description, like LogRhythm, Splunk, and Darktrace. If you have certifications or training related to these tools, mention them during your discussions.
✨Tip Number 2
Familiarize yourself with the OSI Reference Model and network communication protocols. Being able to discuss these topics confidently will show your depth of knowledge and understanding of the role.
✨Tip Number 3
Prepare to discuss real-world scenarios where you've handled security incidents. Be ready to explain your thought process and the steps you took to resolve issues, as this will demonstrate your practical experience.
✨Tip Number 4
Since communication is key in this role, practice articulating complex cyber security concepts in simple terms. This will help you convey your findings effectively to both technical and non-technical stakeholders.
We think you need these skills to ace Security Operations Center Analyst
Some tips for your application 🫡
Highlight Relevant Experience: Make sure to emphasize your experience with LogRhythm, Splunk, Darktrace, and FireEye in your CV and cover letter. Provide specific examples of how you've used these tools in past roles.
Demonstrate Technical Knowledge: Showcase your understanding of the OSI Reference Model and network communication protocols. Include any relevant certifications or training that support your knowledge in incident response and log analysis.
Communicate Clearly: Since excellent verbal and written communication skills are essential, ensure your application is well-structured and free of jargon. Use clear language to explain your technical expertise and how it relates to the role.
Tailor Your Application: Customize your CV and cover letter to reflect the specific requirements mentioned in the job description. Address your ability to manage security incidents and collaborate with team members effectively.
How to prepare for a job interview at Jumar
✨Showcase Your Technical Skills
Be prepared to discuss your experience with LogRhythm, Splunk, Darktrace, and FireEye. Highlight specific instances where you've used these tools to analyze logs or respond to incidents, as this will demonstrate your hands-on expertise.
✨Understand the OSI Model
Make sure you can explain the OSI Reference Model and how it relates to network communication protocols. Be ready to discuss how different layers interact and how this knowledge helps in identifying security threats.
✨Communicate Clearly
Practice articulating complex cyber security concepts in a way that is understandable to both technical and non-technical audiences. This skill is crucial for documenting findings and providing updates to stakeholders.
✨Demonstrate Incident Response Experience
Prepare examples of past incidents you've managed, focusing on your approach to log analysis, PCAP analysis, and how you tracked remedial activities. This will show your capability in handling security incidents effectively.