L3 SOC Analyst

L3 SOC Analyst

Reading Full-Time No home office possible
L

Job Description

L3 SOC Analyst

A Global Organisation requires a Contract L3 SOC Analyst to join their Incident Response team acting as an escalation point – Splunk & Defender

  • Day Rate: £475 – £500pd
  • IR35 Status: Inside
  • Duration: 6 months initially
  • Travel: 2 days a week in Berkshire
  • This L3 SOC Analyst will have the previous following experience:

    • Act as a lead investigator for high-severity security incidents, coordinating response activities and containment strategies.
    • Perform deep forensic analysis across endpoints, logs, and network traffic to uncover advanced threats.
    • Develop and fine-tune detection rules and correlation logic in SIEM platforms (e.g., Splunk).
    • Collaborate with engineering and threat intelligence teams to improve detection coverage and SOC workflows.
    • Mentor and guide L1/L2 analysts, providing training, quality reviews, and escalation support.
    • Design and execute proactive threat hunting campaigns using tools such as Defender, CrowdStrike, and custom scripts.
    • Contribute to playbook development, automation improvements (including Microsoft Co-pilot integration), and process optimization.
    • Produce executive-level incident reports, root cause analyses, and recommendations for remediation and hardening.
L

Contact Detail:

La Fosse Recruiting Team

L
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>