At a Glance
- Tasks: Monitor and respond to security incidents in a fast-paced environment.
- Company: Join a leading organization focused on cybersecurity solutions.
- Benefits: Enjoy 12-hour shifts with potential for career growth and skill development.
- Why this job: Be part of a critical mission to protect networks and gain hands-on experience.
- Qualifications: 3+ years in SOC or security analysis, with active security clearance required.
- Other info: Work on-site in Stevenage, collaborating with a dynamic team.
The predicted salary is between 42000 - 84000 £ per year.
Senior Soc Analyst On site Stevenage Inside IR35 Due to timescale of the project the ideal candidate will hold Active Security Clearance 24/7 Desk 12 hour shifts days 7am-7pm days or 7pm-7am nights The Candidate Experience with LogRhythm/ Splunk, Darktrace (Threat Visualizer) and FireEye (EX, NX, HX, CMS) is required. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Knowledge or experience with any of the following is a plus: Observe IT, Symantec MessageLabs, IronPort, Splunk Phantom and Recorded Future. Experience or demonstrable knowledge in Incident response, log analysis and PCAP analysis Good level of understanding in the approach threat actors take to attacking a network; phishing, port scanning, web application attacks, DDoS, lateral movement. Knowledge in Windows and/or Linux operating systems, how to investigate them for signs of compromise. Ability to demonstrate the right approach to investigating alerts and/or indicators and document your findings in a manner that both peer and executive level colleagues can understand. Ability to track complex remedial activities from multiple sources and provide updates to the customer in a user centric way. Ability to clearly articulate cyber security risks against business outcomes and provide advice on the remedial actions that should be undertaken. Used to managing and collaborating with multiple team members and reporting progress to stakeholders. Experience in managing security incidents on behalf of stakeholders. Experience within Defensive Cyber-attack methodologies and frameworks. Foundational level of scripting knowledge is desirable. 3+ years’ experience working within Security Operations Centres (SOCs) or as a security analyst to resolve security incidents across a range of tools as listed above. Excellent verbal and written communications
Security Operations Center Analyst employer: Jumar
Contact Detail:
Jumar Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Operations Center Analyst
✨Tip Number 1
Make sure to highlight your experience with the specific tools mentioned in the job description, like LogRhythm, Splunk, and Darktrace. If you have certifications or training related to these tools, mention them during your discussions.
✨Tip Number 2
Familiarize yourself with the OSI Reference Model and network communication protocols. Being able to discuss these topics confidently will show your depth of knowledge and understanding of the role.
✨Tip Number 3
Prepare to discuss real-world scenarios where you've handled security incidents. Be ready to explain your thought process and the steps you took to resolve issues, as this will demonstrate your practical experience.
✨Tip Number 4
Since communication is key in this role, practice articulating complex cyber security concepts in simple terms. This will help you convey your findings effectively to both technical and non-technical stakeholders.
We think you need these skills to ace Security Operations Center Analyst
Some tips for your application 🫡
Highlight Relevant Experience: Make sure to emphasize your experience with LogRhythm, Splunk, Darktrace, and FireEye in your CV and cover letter. Provide specific examples of how you've used these tools in past roles.
Demonstrate Technical Knowledge: Showcase your understanding of the OSI Reference Model and network communication protocols. Include any relevant certifications or training that support your knowledge in incident response and log analysis.
Communicate Clearly: Since excellent verbal and written communication skills are essential, ensure your application is well-structured and free of jargon. Use clear language to explain your technical expertise and how it relates to the role.
Tailor Your Application: Customize your CV and cover letter to reflect the specific requirements mentioned in the job description. Address your ability to manage security incidents and collaborate with team members effectively.
How to prepare for a job interview at Jumar
✨Showcase Your Technical Skills
Be prepared to discuss your experience with LogRhythm, Splunk, Darktrace, and FireEye. Highlight specific instances where you've used these tools to analyze logs or respond to incidents, as this will demonstrate your hands-on expertise.
✨Understand the OSI Model
Make sure you can explain the OSI Reference Model and how it relates to network communication protocols. Be ready to discuss how different layers interact and how this knowledge helps in identifying security threats.
✨Communicate Clearly
Practice articulating complex cyber security concepts in a way that is understandable to both technical and non-technical audiences. This skill is crucial for documenting findings and providing updates to stakeholders.
✨Demonstrate Incident Response Experience
Prepare examples of past incidents you've managed, focusing on your approach to log analysis, PCAP analysis, and how you tracked remedial activities. This will show your capability in handling security incidents effectively.