At a Glance
- Tasks: Lead complex incident investigations and mentor junior analysts in a dynamic SOC environment.
- Company: Join a leading UK Investment Management firm building its Cyber Defence capability.
- Benefits: Competitive salary, bonus, and great benefits with opportunities for professional growth.
- Why this job: Shape the future of cyber security in a greenfield SOC buildout and make a real impact.
- Qualifications: 5+ years in SOC, expertise in Microsoft Security stack, and cloud-native environments.
- Other info: Work alongside Cyber Security experts in a collaborative and innovative team.
The predicted salary is between 100000 - 120000 £ per year.
Location – London (minimum 3 days in office per week)
Salary - £100-120k + 20-30% Bonus + Great Benefits
Currently working with a UK Investment Management firm who are in the process of building out their Cyber Defence capability and looking to bring in a cloud-based Security Operations Specialist, with a blend of both Analysis and Engineering experience. You will be dealing with the escalated alerts from a 3rd party MSSP, investigating and responding to the most complex incidents whilst building out IR Playbooks and Processes and developing the internal Threat Hunting capability. You will act as a mentor to the more junior Analysts within the team and play a pivotal role in shaping how the SOC capability is built. This is an incredible opportunity for an experienced Senior SOC Analyst / Engineer to join a growing yet established firm at a crucial point as they completely build out their Information and Cyber Security capability. Whilst they have the fundamentals in place, this is a completely greenfield SOC buildout, where you will work alongside the Head of SecOps to shape their SOC monitoring, detection and response function.
Key Responsibilities:
- Act as a lead and technical escalation point on the most complex incidents and investigations.
- Proactively look for opportunities to automate, fine-tune and streamline the detection engineering and general SOC capabilities.
- Utilise various internal and external Threat Intelligence feeds to execute proactive threat hunting campaigns.
- Mentor and train junior team members through complex incident response investigations.
Key Requirements:
- Significant experience working in a SOC environment (5+ Years), responding to and containing the most high-profile, escalated incidents.
- Comprehensive knowledge of the Microsoft Security stack – Defender, Sentinel, E5 Security Suite, etc.
- Proven experience building detection rules, fine-tuning and streamlining SOC tooling and capabilities.
- Experience working in cloud-native SOC environments – Azure and/or Azure.
If you’re an experienced Security Operations Specialist, looking to shape how one of the most innovative Investment Management firms build out their cyber defence capability and leave a lasting impact on one of the most reputable organisations whilst working alongside a team of genuine Cyber Security SMEs, click the to apply or get in touch directly – j.dale@lawrenceharvey.com
Windows Specialist in City of London employer: Lawrence Harvey
Contact Detail:
Lawrence Harvey Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Windows Specialist in City of London
✨Network Like a Pro
Get out there and connect with people in the industry! Attend meetups, conferences, or even online webinars. The more you engage with others, the better your chances of hearing about job openings before they hit the market.
✨Show Off Your Skills
Don’t just talk about your experience; demonstrate it! Create a portfolio or a blog where you can showcase your projects, especially those related to SOC operations and threat hunting. This will make you stand out when you apply through our website.
✨Ace the Interview
Prepare for interviews by practising common questions and scenarios specific to Security Operations. Think about how you would handle complex incidents and be ready to discuss your thought process. Confidence is key!
✨Follow Up
After an interview, don’t forget to send a thank-you email! It shows your enthusiasm for the role and keeps you fresh in their minds. Plus, it’s a great opportunity to reiterate why you’re the perfect fit for their SOC team.
We think you need these skills to ace Windows Specialist in City of London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV reflects the specific skills and experiences mentioned in the job description. Highlight your experience in SOC environments and any relevant cloud-based security tools you've worked with.
Craft a Compelling Cover Letter: Use your cover letter to tell us why you're the perfect fit for this role. Share specific examples of how you've handled complex incidents or mentored junior analysts, as this will resonate well with our team.
Showcase Your Technical Skills: Don’t forget to mention your knowledge of the Microsoft Security stack and any automation or detection engineering projects you've been involved in. We love seeing candidates who can demonstrate their technical prowess!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you don’t miss out on any important updates during the process.
How to prepare for a job interview at Lawrence Harvey
✨Know Your Stuff
Make sure you brush up on your knowledge of the Microsoft Security stack, especially Defender and Sentinel. Be ready to discuss how you've used these tools in past roles, as well as any specific incidents you've managed.
✨Showcase Your Experience
Prepare examples from your 5+ years in a SOC environment where you've dealt with high-profile incidents. Highlight your role in those situations and how you contributed to the resolution, especially if you automated or streamlined processes.
✨Be a Mentor
Since mentoring junior analysts is part of the role, think about how you've trained or guided others in the past. Share specific instances where your mentorship made a difference in incident response or team development.
✨Think Proactively
Demonstrate your proactive approach by discussing any threat hunting campaigns you've executed. Be prepared to talk about how you utilised threat intelligence feeds and what results you achieved from those efforts.