At a Glance
- Tasks: Lead security incident management and support our Cyber Transformation Project.
- Company: Join Capita, a leader in Cyber Security solutions.
- Benefits: Enjoy remote work flexibility and a competitive salary up to £65k.
- Why this job: Be part of a dynamic team making a real impact in cybersecurity.
- Qualifications: Strong technical background in IT Engineering or Systems Administration required.
- Other info: Opportunity for leadership and mentoring within a virtual team.
The predicted salary is between 39000 - 65000 £ per year.
Full Time Remote Paying up to £65k A great opportunity to join our team as our Senior SOC Analyst to be responsible for handing security incidents received/escalated from the SOC Analyst (Tier 1 or Tier 2) and perform a business impact analysis on the security incident. As well as working on our Cyber Transformation Project. We are looking for a strong technical background, possibly IT Engineering or Systems Administration (cloud and on-premises), coupled with security experience to bring a multi-faceted set of skills to Capita’s Cyber Security toolsets. An excellent working knowledge of MS Sentinel is a must from both an operational analyst’s perspective and a technologist, whose responsibilities include build, deploy, run and improvement. You will also support the initial implementation of new security related Microsoft technologies, including Microsoft Sentinel, MDE, MDI and Defender for Cloud. As well as undertaking some devops tasks. What You’ll Be Doing: Oversee completion of day-to-day checklist(s), including log review, management report scheduling & running, alert analysis, and escalation follow up. Perform advanced event and incident analysis, including baseline establishment and trend analysis. Manage a number of analysts as part of a virtual team of L1 and L2 analysts, including objectives setting, performance management / reviews, training & development, and BAU activities including shift cover etc Support on-call arrangements as part of a Rota, to support L1 Analysts working out of hours. Support Major Incident Response activity, from a Protective Monitoring perspective, including supporting teams in identification, containment, and remediation of security related threat. Identify opportunities for SOC and client SIEM platform configuration improvements, use case development, monitoring rule creation, tuning & optimization. Assist in architectural design to facilitate the onboarding of new information systems, including the assessment, parsing, onboarding of log sources, and use case and rule development. What we’re looking for: Experience in managing Microsoft Sentinel as an MSSP, including Lighthouse, and management and multi-customer environments using DevOps Level 3 SOC Analyst / Senior Cyber Security and/or security operations experience Experience with SIEM platforms, including IBM QRadar, Microsoft Sentinel and LogRhythm In-depth experience with Microsoft Sentinel, including use case and rule development, workbook / playbook creation, KQL & Logic Apps / SOAR Experience of onboarding, tuning, reporting, and configuring SIEM solutions Experience of threat intelligence Leadership and mentoring experience and skills Understanding of low-level concepts including operating systems and networking Commercial experience in Penetration Testing and / or Security Monitoring Understanding of networking and infrastructure design Cyber security degree or equivalent experience Active or ability to obtain SC clearance Preferred Qualification: SANS Certification Experience with NIST assurance/EDR IT Certifications, including Network+, Security+, AZ-500 Protective Monitoring / SOC Certifications, including CySA+ Cyber Security Certifications, including CISMP, CISSP Experience with various Microsoft Technologies, including Microsoft Defender for Endpoint, Identity and Cloud
Security Operations Center Analyst employer: Lorien
Contact Detail:
Lorien Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Operations Center Analyst
✨Tip Number 1
Familiarize yourself with Microsoft Sentinel and its functionalities. Since this role requires in-depth experience with Sentinel, understanding its operational aspects and how to manage it effectively will give you a significant edge.
✨Tip Number 2
Highlight your leadership and mentoring skills. As you'll be managing a team of analysts, showcasing your ability to lead and develop others can set you apart from other candidates.
✨Tip Number 3
Stay updated on the latest trends in cyber security and threat intelligence. Being knowledgeable about current threats and mitigation strategies will demonstrate your commitment to the field and your proactive approach.
✨Tip Number 4
Prepare to discuss your experience with SIEM platforms in detail. Be ready to provide examples of how you've configured, tuned, and optimized these systems in previous roles, as this is crucial for the position.
We think you need these skills to ace Security Operations Center Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in security operations, particularly with Microsoft Sentinel and other SIEM platforms. Emphasize any leadership roles or mentoring experience you've had, as well as your technical skills in IT Engineering or Systems Administration.
Craft a Strong Cover Letter: In your cover letter, express your enthusiasm for the role and the company. Discuss your experience with incident analysis and your ability to manage a team of analysts. Mention specific projects or achievements that demonstrate your expertise in cyber security and your familiarity with Microsoft technologies.
Showcase Relevant Certifications: List any relevant certifications you hold, such as SANS Certification, CySA+, or CISSP. Highlight how these qualifications have prepared you for the responsibilities outlined in the job description, especially in relation to threat intelligence and security monitoring.
Prepare for Technical Questions: Be ready to discuss your technical knowledge during the application process. Prepare examples of how you've used Microsoft Sentinel in previous roles, including any specific use cases or rule developments you've implemented. This will demonstrate your hands-on experience and problem-solving abilities.
How to prepare for a job interview at Lorien
✨Showcase Your Technical Skills
Make sure to highlight your technical background, especially in IT Engineering or Systems Administration. Be prepared to discuss your experience with Microsoft Sentinel and other SIEM platforms, as well as any relevant certifications you hold.
✨Demonstrate Leadership Experience
Since the role involves managing a team of analysts, be ready to share examples of your leadership and mentoring experiences. Discuss how you've set objectives, conducted performance reviews, and supported team development in previous roles.
✨Prepare for Scenario-Based Questions
Expect questions that assess your problem-solving skills in real-world scenarios. Think about past incidents you've managed, how you performed incident analysis, and the steps you took for containment and remediation.
✨Understand the Cyber Transformation Project
Familiarize yourself with Capita’s Cyber Transformation Project and be ready to discuss how your skills can contribute to its success. Show enthusiasm for supporting the implementation of new security technologies and improving existing processes.