At a Glance
- Tasks: Analyse security incidents and recommend rapid remediation actions in a high-impact Defence environment.
- Company: Join a mission-critical Defence organisation with long-term stability until 2027.
- Benefits: Competitive day rate up to £640, with potential for contract extension.
- Other info: Enjoy a dynamic shift pattern with a supportive team and opportunities for growth.
- Why this job: Work on complex security incidents and make a real difference in cyber defence.
- Qualifications: 2+ years of Tier 2/3 SOC Analyst experience and industry-standard security qualifications.
Location: Corsham - 100% on-site
Day Rate: Up to £640
Contract Length: Until 26th April 2027, with potential for extension
IR35: In scope
Why this could interest you:
- Rare chance to work in a high-impact, mission-critical Defence environment.
- Long-term stability to 2027, with possibility of extension depending on funding.
- Tier 2/3 level work - genuinely complex incidents, not just first-line alert handling.
Key responsibilities:
- Tier 2/3 SOC analysis in an enterprise environment.
- Perform triage of security events - determine scope, priority and impact, and recommend rapid remediation actions.
- Conduct real-time management of security incidents from detection through to resolution.
- Work with SIEM technologies and SIEM engineering, including tool configuration (e.g. ArcSight).
- Create and maintain use cases, analytics and playbooks.
- Contribute to security monitoring across on-prem and cloud technologies.
Shift pattern & working conditions:
- 13-hour shifts - days and nights, including some weekends.
- 4 on 5 off, then 5 on 4 off - averaging a standard 37-hour week.
- Fully on-site in Corsham.
Essential requirements:
- Strongly preferred to have Active DV Clearance (Developed Vetting) and eligibility for Sensitive Post Check.
- Industry-standard SOC security qualifications (e.g. SANS, ISC2).
- Proven Tier 2/3 SOC Analyst experience (2+ years).
- Hands-on experience with SIEM technologies and engineering (ideally including ArcSight).
- Experience creating SOC use cases, analytics and playbooks.
Desirable:
- Degree in a technical, engineering or computing discipline.
- Defence / MOD experience.
- Previous lead-level SOC experience (though an experienced Tier 2 Analyst would also be considered).
Cyber Security Analyst in Corsham employer: NonStop Consulting
Contact Detail:
NonStop Consulting Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Security Analyst in Corsham
✨Tip Number 1
Network like a pro! Reach out to folks in the cyber security field, especially those who work in SOC environments. Attend meetups or online webinars to connect with potential employers and get insider info on job openings.
✨Tip Number 2
Show off your skills! Create a portfolio that highlights your experience with SIEM technologies and any incident management you've handled. This can really set you apart when you're chatting with hiring managers.
✨Tip Number 3
Prepare for interviews by brushing up on real-world scenarios. Be ready to discuss how you've triaged security events or managed incidents in the past. We want to see your problem-solving skills in action!
✨Tip Number 4
Don't forget to apply through our website! It’s the best way to ensure your application gets seen. Plus, we love seeing candidates who are proactive about their job search.
We think you need these skills to ace Cyber Security Analyst in Corsham
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Cyber Security Analyst role. Highlight your Tier 2/3 SOC experience and any relevant qualifications like SANS or ISC2. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cyber security and how your experience aligns with our mission-critical Defence environment. Keep it concise but impactful!
Showcase Your Technical Skills: Don’t forget to mention your hands-on experience with SIEM technologies, especially ArcSight. We love seeing specific examples of how you've tackled complex incidents in the past, so be sure to include those!
Apply Through Our Website: We encourage you to apply through our website for a smoother application process. It helps us keep track of your application and ensures you don’t miss out on any important updates from us!
How to prepare for a job interview at NonStop Consulting
✨Know Your Stuff
Make sure you brush up on your knowledge of SOC analysis and SIEM technologies, especially ArcSight. Be ready to discuss your hands-on experience and any specific incidents you've managed. This will show that you're not just familiar with the theory but have practical skills too.
✨Showcase Your Problem-Solving Skills
Prepare to talk about how you've triaged security events in the past. Think of examples where you determined scope, priority, and impact, and what rapid remediation actions you recommended. This will demonstrate your ability to handle complex incidents effectively.
✨Understand the Defence Environment
Since this role is in a mission-critical Defence environment, it’s crucial to understand the unique challenges and requirements. Familiarise yourself with the importance of security clearance and how it impacts your work. Showing awareness of the context can set you apart from other candidates.
✨Ask Insightful Questions
Prepare some thoughtful questions about the team dynamics, shift patterns, and the types of incidents you might encounter. This not only shows your interest in the role but also helps you gauge if the position aligns with your career goals.