At a Glance
- Tasks: Triage security events, monitor SIEM, and manage incidents in a dynamic environment.
- Company: Join a leading cybersecurity firm with a focus on innovation and teamwork.
- Benefits: Enjoy a competitive salary, shift allowance, and opportunities for professional growth.
- Other info: Hybrid work model with excellent career advancement opportunities.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technologies.
- Qualifications: Experience with SIEM technologies and a solid understanding of security solutions required.
The predicted salary is between 40000 - 50000 € per year.
Location: Hybrid - Birmingham (1 day every 2 weeks). Standard Hours: the first 4 months before moving to a 4 on/4 off 12‑hour shift schedule. Must be willing to work shifts after 6 months which are likely to be 4 x 12‑hour shifts (4 on, 4 off).
Security clearance: Must hold or be able to acquire Security Clearance (SC) – 5 years UK address history.
Key Responsibilities
- Triage security events and incidents.
- Monitor the SIEM to identify anomalies and potential security threats.
- Monitor the health of the SIEM and other critical components within the infrastructure.
- Participate in evaluating the security of monitored infrastructure systems and recommend additional security solutions where appropriate.
- Communicate with external teams for incident resolution.
- Participate in security incident management and vulnerability management processes.
- Communicate effectively with customers, teammates, and management.
- Follow & improve internal guidelines, playbooks and practices for management of incidents and changes.
- Document and maintain security procedures and processes.
- Build & deliver customer service reviews.
Required Skills and Qualifications
- Security monitoring experience with one or more SIEM technologies, ideally Microsoft Sentinel and/or Google SecOps.
- Strong understanding of Windows, Linux and cloud technologies.
- Good understanding of security solutions including SIEMs, Web Proxies, Anti‑Virus, Firewalls, VPN, authentication providers and mechanisms, encryption, IPS/IDS.
- Good understanding of security incident management, malware management and vulnerability management processes.
- Experience of working in an MSSP SOC environment.
- Attention to detail and quality.
Desirable Skills and Qualifications
- CREST Practitioner Intrusion Analyst (CPIA)
- Microsoft Security Operations Analyst (SC‑200)
- Security Blue Team Level 1 (BTL1)
Senior SOC Analyst - (Sentinel) - plus 20% shift allowance (Standard Hours the first 4 months before in Bristol employer: Resillion
As a Senior SOC Analyst at our Birmingham location, you will join a dynamic team that values innovation and collaboration in a hybrid work environment. We offer competitive benefits, including a 20% shift allowance, and a culture that prioritises employee growth through continuous training and development opportunities. With a focus on security excellence, you will play a crucial role in safeguarding our clients while enjoying the unique advantage of a flexible shift schedule that promotes work-life balance.
StudySmarter Expert Advice🤫
We think this is how you could land Senior SOC Analyst - (Sentinel) - plus 20% shift allowance (Standard Hours the first 4 months before in Bristol
✨Tip Number 1
Network like a pro! Reach out to current or former employees in the SOC field, especially those who have worked with Microsoft Sentinel. They can give you insider tips and might even refer you directly, which can really boost your chances.
✨Tip Number 2
Prepare for the interview by brushing up on your technical skills. Make sure you can confidently discuss your experience with SIEM technologies and security incident management. We want to see that you know your stuff and can handle real-world scenarios!
✨Tip Number 3
Showcase your soft skills! Communication is key in this role, so be ready to demonstrate how you've effectively communicated with teams and customers in past positions. We love candidates who can articulate their thoughts clearly and work well with others.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re genuinely interested in joining our team at StudySmarter.
We think you need these skills to ace Senior SOC Analyst - (Sentinel) - plus 20% shift allowance (Standard Hours the first 4 months before in Bristol
Some tips for your application 🫡
Tailor Your CV:Make sure your CV is tailored to the Senior SOC Analyst role. Highlight your experience with SIEM technologies, especially Microsoft Sentinel, and any relevant security certifications. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter:Your cover letter is your chance to shine! Use it to explain why you're passionate about security and how your background makes you a great fit for our team. Don’t forget to mention your experience in an MSSP SOC environment if you have it!
Showcase Your Communication Skills:As a Senior SOC Analyst, you'll need to communicate effectively with various teams. In your application, give examples of how you've successfully communicated during incident management or when working with customers. We love clear communicators!
Apply Through Our Website:We encourage you to apply through our website for the best chance of getting noticed. It’s super easy, and you’ll be able to keep track of your application status. Plus, we love seeing applications come directly from our site!
How to prepare for a job interview at Resillion
✨Know Your SIEM Inside Out
Make sure you’re well-versed in Microsoft Sentinel and any other SIEM technologies mentioned in the job description. Brush up on how to triage security events and monitor for anomalies, as these are key responsibilities. Being able to discuss your hands-on experience with these tools will definitely impress.
✨Show Off Your Security Knowledge
Prepare to talk about your understanding of security solutions like firewalls, VPNs, and malware management processes. Be ready to give examples of how you've used this knowledge in past roles, especially in an MSSP SOC environment. This will demonstrate your expertise and readiness for the role.
✨Communicate Clearly and Confidently
Since the role involves communicating with external teams and customers, practice articulating your thoughts clearly. You might want to prepare a few scenarios where you successfully resolved incidents or collaborated with others. This will showcase your communication skills and ability to work in a team.
✨Understand the Shift Requirements
Be prepared to discuss your willingness to adapt to the 4 on/4 off shift schedule after the initial months. It’s important to show that you’re flexible and understand the demands of the role. Mentioning how you manage work-life balance during shifts can also be a plus.