Incident Response (CSIRT) / SOC Level 3 Analyst

Incident Response (CSIRT) / SOC Level 3 Analyst

Full-Time 36000 - 60000 € / year (est.) No home office possible
M

At a Glance

  • Tasks: Lead incident response for high-severity cyber threats and enhance security processes.
  • Company: Dynamic tech firm focused on cybersecurity and innovation.
  • Benefits: Hybrid work, competitive salary, and opportunities for professional growth.
  • Other info: Join a collaborative team and mentor junior analysts while advancing your career.
  • Why this job: Make a real impact in safeguarding networks and data from cyber risks.
  • Qualifications: Experience in SOC roles and strong knowledge of cybersecurity tools and frameworks.

The predicted salary is between 36000 - 60000 € per year.

Location: Crawley (Hybrid)

Department: Information Systems

Type: Contract | Full-time Outside IR35

About the Role

My client is seeking an experienced Incident Response (CSIRT) / Security Operations Centre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you will respond to high-severity cyber incidents and escalated security events, leveraging your technical expertise, analytical mindset, and industry-standard tools to contain, eradicate, and recover from cyber threats. Your work will directly contribute to safeguarding my client's network systems, operational technology, and customer data from emerging and sophisticated cyber risks.

Key Responsibilities

  • Lead the response to escalated and high-severity cyber incidents, ensuring rapid containment and recovery.
  • Conduct advanced threat hunting across IT and OT environments to identify and eliminate hidden threats.
  • Develop and enhance SOC policies, playbooks, and incident response processes to align with industry best practices.
  • Collaborate with the Managed Security Service Provider (MSSP) and internal teams to ensure complete log source integration and effective alert correlation across cloud and on-prem environments.
  • Support and develop the organisation's SOAR platform, creating automated workflows and improving response efficiency.
  • Perform digital forensics investigations, analysing logs, network data, and system artefacts to determine root causes.
  • Participate in cyber crisis simulation exercises and continuous improvement initiatives to enhance resilience.
  • Contribute to security audits and compliance efforts (e.g. ISO 27001, NCSC CAF, GDPR).
  • Mentor Level 1 and Level 2 SOC Analysts, helping to build team capability and knowledge.

About You

You will bring a combination of technical expertise, analytical acumen, and a collaborative approach to problem-solving.

Essential Qualifications & Experience

  • Proven experience in a SOC Level 2 or Level 3 role, with demonstrable expertise in incident response and advanced threat hunting.
  • A degree in Computer Science, Cybersecurity, IT, or a related discipline, or equivalent professional experience.
  • Industry-recognised certifications such as CISSP, GIAC/GCIA/GCIH, AZ-500, CEH, CASP+, or SIEM-specific training.
  • Strong knowledge of SIEM, SOAR, EDR, IDS/IPS, NAC, DLP, and related security technologies.
  • Familiarity with frameworks such as MITRE ATT&CK, NIST, CIS, and ISO/IEC 27001/27002.
  • Hands-on experience with tools such as FortiSIEM, Q-Radar, Microsoft Defender, Darktrace, Microsoft Sentinel, or similar platforms.
  • Experience in forensic analysis, red-team exercises, and crisis simulation activities.

Desirable

  • Experience managing or supporting both IT and OT environments.
  • In-depth understanding of adversarial TTPs and complex threat landscapes.

Incident Response (CSIRT) / SOC Level 3 Analyst employer: Morson Edge

Join a forward-thinking organisation in Crawley that prioritises employee growth and development within the dynamic field of cybersecurity. As an Incident Response (CSIRT) / SOC Level 3 Analyst, you will benefit from a collaborative work culture that encourages innovation and continuous learning, while also enjoying the flexibility of a hybrid working model. With opportunities to mentor junior analysts and engage in cutting-edge security initiatives, this role offers a meaningful career path in safeguarding vital information systems.

M

Contact Detail:

Morson Edge Recruiting Team

StudySmarter Expert Advice🤫

We think this is how you could land Incident Response (CSIRT) / SOC Level 3 Analyst

Tip Number 1

Network, network, network! Get out there and connect with folks in the cybersecurity field. Attend meetups, webinars, or even local events. You never know who might have a lead on that perfect SOC Level 3 Analyst role!

Tip Number 2

Show off your skills! Create a portfolio or GitHub repository showcasing your incident response projects or threat hunting techniques. This gives potential employers a taste of what you can bring to the table.

Tip Number 3

Prepare for interviews like a pro. Research common SOC interview questions and practice your responses. Be ready to discuss your experience with tools like SIEM and EDR, and how you've tackled high-severity incidents in the past.

Tip Number 4

Don’t forget to apply through our website! We’ve got loads of resources to help you land that dream job. Plus, it shows you’re genuinely interested in joining our team at StudySmarter.

We think you need these skills to ace Incident Response (CSIRT) / SOC Level 3 Analyst

Incident Response
Threat Hunting
Digital Forensics
SIEM
SOAR
EDR
IDS/IPS

Some tips for your application 🫡

Read the Job Description Carefully:Before you start your application, take a good look at the job description. Make sure you understand what we're looking for in an Incident Response Analyst and how your skills match up. This will help you tailor your application to stand out!

Showcase Your Experience:When writing your application, highlight your relevant experience in SOC roles and incident response. Use specific examples that demonstrate your expertise in handling high-severity cyber incidents and threat hunting. We want to see how you've made an impact in your previous roles!

Be Authentic:Let your personality shine through in your application! We value collaboration and a team-oriented mindset, so don’t be afraid to share your approach to problem-solving and how you work with others. Authenticity goes a long way in making a connection with us.

Apply Through Our Website:We encourage you to submit your application through our website. It’s the best way to ensure it gets into the right hands. Plus, you’ll find all the details you need about the role and our company culture there!

How to prepare for a job interview at Morson Edge

Know Your Stuff

Make sure you brush up on your technical knowledge related to incident response and threat hunting. Familiarise yourself with the tools mentioned in the job description, like FortiSIEM and Q-Radar, so you can confidently discuss your hands-on experience during the interview.

Showcase Your Problem-Solving Skills

Prepare to share specific examples of how you've tackled high-severity incidents in the past. Use the STAR method (Situation, Task, Action, Result) to structure your answers, highlighting your analytical mindset and collaborative approach.

Understand the Company’s Needs

Research the company and its security posture. Be ready to discuss how your skills align with their goals, especially regarding safeguarding network systems and customer data. This shows that you're not just interested in the role but also invested in their mission.

Ask Smart Questions

Prepare insightful questions about the team dynamics, incident response processes, and how they measure success in the SOC. This demonstrates your genuine interest in the role and helps you gauge if the company is the right fit for you.