Job Description
L3 SOC Analyst
A Global Organisation requires a Contract L3 SOC Analyst to join their Incident Response team acting as an escalation point – Splunk & Defender
- Day Rate: £475 – £500pd
- IR35 Status: Inside
- Duration: 6 months initially
- Travel: 2 days a week in Berkshire
-
This L3 SOC Analyst will have the previous following experience:
- Act as a lead investigator for high-severity security incidents, coordinating response activities and containment strategies.
- Perform deep forensic analysis across endpoints, logs, and network traffic to uncover advanced threats.
- Develop and fine-tune detection rules and correlation logic in SIEM platforms (e.g., Splunk).
- Collaborate with engineering and threat intelligence teams to improve detection coverage and SOC workflows.
- Mentor and guide L1/L2 analysts, providing training, quality reviews, and escalation support.
- Design and execute proactive threat hunting campaigns using tools such as Defender, CrowdStrike, and custom scripts.
- Contribute to playbook development, automation improvements (including Microsoft Co-pilot integration), and process optimization.
- Produce executive-level incident reports, root cause analyses, and recommendations for remediation and hardening.
Contact Detail:
La Fosse Recruiting Team