At a Glance
- Tasks: Investigate security incidents and enhance detection capabilities in a dynamic SOC environment.
- Company: Join a forward-thinking organisation focused on strengthening cyber security.
- Benefits: Competitive salary, hybrid work model, and opportunities for professional growth.
- Why this job: Make a real impact in cyber security while developing your skills in a supportive team.
- Qualifications: Experience in SOC environments and strong analytical skills are essential.
- Other info: Exciting career progression opportunities in a fast-paced industry.
The predicted salary is between 39000 - 52000 £ per year.
We're currently working with an organisation that is continuing to strengthen its cyber security capability and is looking to bring in a SOC Analyst (Tier 2) to support their security operations function. This role will focus on investigating security incidents, improving detection capabilities and supporting the wider incident response process.
Key Responsibilities:
- Investigate and respond to security alerts and incidents
- Perform threat analysis and incident investigation
- Analyse security logs and events using SIEM platforms
- Support the development of detection rules and threat monitoring
- Work with Tier 1 analysts to investigate and escalate complex threats
- Contribute to continuous improvement of the organisation's security monitoring capability
Required Skills:
- Experience working within a SOC or security operations environment
- Strong understanding of security threats, vulnerabilities and attack techniques
- Hands-on experience with SIEM platforms (Splunk, Sentinel, QRadar, Elastic)
- Knowledge of endpoint security tools and incident response processes
- Strong analytical and investigative skills
Nice to Have:
- Experience with CrowdStrike, SentinelOne or Microsoft Defender
- Knowledge of MITRE ATT&CK framework
- Relevant certifications such as CySA+, CEH or Security+
If this sounds like you, apply now for consideration.
SOC Analyst T2 in London employer: Oscar Technology
Contact Detail:
Oscar Technology Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Analyst T2 in London
✨Tip Number 1
Network like a pro! Reach out to folks in the industry on LinkedIn or at local meetups. We all know that sometimes it’s not just what you know, but who you know that can help you land that SOC Analyst gig.
✨Tip Number 2
Show off your skills! Create a portfolio or a blog where you can share your insights on security incidents or threat analysis. This not only showcases your expertise but also demonstrates your passion for the field.
✨Tip Number 3
Prepare for those interviews! Brush up on common SOC scenarios and be ready to discuss how you’d handle specific incidents. We recommend practising with a friend or using mock interview platforms to get comfortable.
✨Tip Number 4
Don’t forget to apply through our website! We’ve got loads of opportunities waiting for you, and applying directly can sometimes give you an edge. Plus, we’re here to support you every step of the way!
We think you need these skills to ace SOC Analyst T2 in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the SOC Analyst role. Highlight your experience in security operations and any hands-on work with SIEM platforms. We want to see how your skills match what we're looking for!
Showcase Your Skills: In your application, don’t just list your skills—show us how you've used them! Whether it's investigating security incidents or developing detection rules, give us examples that demonstrate your expertise.
Be Clear and Concise: Keep your application clear and to the point. Use bullet points where possible to make it easy for us to read. We appreciate a well-structured application that gets straight to the good stuff!
Apply Through Our Website: We encourage you to apply through our website for the best chance of getting noticed. It’s super easy, and we can’t wait to see your application come through!
How to prepare for a job interview at Oscar Technology
✨Know Your Tools
Familiarise yourself with the SIEM platforms mentioned in the job description, like Splunk or QRadar. Be ready to discuss your hands-on experience and how you've used these tools to investigate security incidents.
✨Brush Up on Threat Analysis
Make sure you understand common security threats and attack techniques. Prepare examples of how you've responded to incidents in the past, showcasing your analytical skills and ability to think critically under pressure.
✨Understand the MITRE ATT&CK Framework
If you have knowledge of the MITRE ATT&CK framework, be prepared to discuss it. This shows that you’re not just familiar with security concepts but also understand how to apply them in real-world scenarios.
✨Show Continuous Improvement Mindset
Think about ways you've contributed to improving security processes in previous roles. Highlight any initiatives you've taken to enhance detection capabilities or streamline incident response, as this aligns with the organisation's goals.