At a Glance
- Tasks: Triage security events, monitor SIEM, and manage incidents in a dynamic environment.
- Company: Join a leading cybersecurity firm with a focus on innovation and teamwork.
- Benefits: Enjoy a competitive salary, shift allowance, and opportunities for professional growth.
- Other info: Hybrid work model with excellent career advancement opportunities.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technologies.
- Qualifications: Experience with SIEM technologies and a solid understanding of security solutions required.
The predicted salary is between 40000 - 50000 € per year.
Location: Hybrid - Birmingham (1 day every 2 weeks). Standard Hours: the first 4 months before moving to a 4 on/4 off 12‑hour shift schedule. Must be willing to work shifts after 6 months which are likely to be 4 x 12‑hour shifts (4 on, 4 off).
Security clearance: Must hold or be able to acquire Security Clearance (SC) – 5 years UK address history.
Key Responsibilities:
- Triage security events and incidents.
- Monitor the SIEM to identify anomalies and potential security threats.
- Monitor the health of the SIEM and other critical components within the infrastructure.
- Participate in evaluating the security of monitored infrastructure systems and recommend additional security solutions where appropriate.
- Communicate with external teams for incident resolution.
- Participate in security incident management and vulnerability management processes.
- Communicate effectively with customers, teammates, and management.
- Follow & improve internal guidelines, playbooks and practices for management of incidents and changes.
- Document and maintain security procedures and processes.
- Build & deliver customer service reviews.
Required Skills and Qualifications:
- Security monitoring experience with one or more SIEM technologies, ideally Microsoft Sentinel and/or Google SecOps.
- Strong understanding of Windows, Linux and cloud technologies.
- Good understanding of security solutions including SIEMs, Web Proxies, Anti‑Virus, Firewalls, VPN, authentication providers and mechanisms, encryption, IPS/IDS.
- Good understanding of security incident management, malware management and vulnerability management processes.
- Experience of working in an MSSP SOC environment.
- Attention to detail and quality.
Desirable Skills and Qualifications:
- CREST Practitioner Intrusion Analyst (CPIA)
- Microsoft Security Operations Analyst (SC‑200)
- Security Blue Team Level 1 (BTL1)
Senior SOC Analyst - (Sentinel) - plus 20% shift allowance (Standard Hours the first 4 months before in Coventry employer: Resillion
As a Senior SOC Analyst at our Birmingham location, you will join a dynamic team that values innovation and collaboration in a hybrid work environment. We offer competitive benefits, including a 20% shift allowance, and a culture that prioritises employee growth through continuous training and development opportunities. With a focus on security excellence, you will play a crucial role in safeguarding our clients while enjoying the unique advantage of a flexible shift schedule that promotes work-life balance.
StudySmarter Expert Advice🤫
We think this is how you could land Senior SOC Analyst - (Sentinel) - plus 20% shift allowance (Standard Hours the first 4 months before in Coventry
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, especially those already working in SOC roles. Use platforms like LinkedIn to connect and engage with them. You never know who might have the inside scoop on job openings or can refer you directly!
✨Tip Number 2
Prepare for interviews by brushing up on your technical skills and understanding of SIEM technologies, especially Microsoft Sentinel. We recommend doing mock interviews with friends or using online resources to get comfortable discussing your experience and knowledge.
✨Tip Number 3
Showcase your passion for security! During interviews, share your thoughts on recent security trends or incidents. This not only demonstrates your knowledge but also shows that you're genuinely interested in the field. It’s all about making a memorable impression!
✨Tip Number 4
Don’t forget to apply through our website! We’ve got a streamlined process that makes it easy for you to submit your application. Plus, it shows us you’re serious about joining our team. Let’s get you on board!
We think you need these skills to ace Senior SOC Analyst - (Sentinel) - plus 20% shift allowance (Standard Hours the first 4 months before in Coventry
Some tips for your application 🫡
Tailor Your CV:Make sure your CV is tailored to the Senior SOC Analyst role. Highlight your experience with SIEM technologies, especially Microsoft Sentinel, and any relevant security certifications. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter:Your cover letter is your chance to shine! Use it to explain why you're passionate about security and how your background makes you a great fit for our team. Don’t forget to mention your experience in an MSSP SOC environment!
Showcase Your Communication Skills:As a Senior SOC Analyst, you'll need to communicate effectively with various teams. In your application, give examples of how you've successfully communicated during incident management or when collaborating with others. We love clear communicators!
Apply Through Our Website:We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it’s super easy – just follow the prompts and submit your details!
How to prepare for a job interview at Resillion
✨Know Your SIEM Inside Out
Make sure you’re well-versed in Microsoft Sentinel and any other SIEM technologies mentioned in the job description. Brush up on how to triage security events and monitor for anomalies, as these are key responsibilities. Being able to discuss your hands-on experience with these tools will definitely impress.
✨Show Off Your Security Knowledge
Prepare to talk about your understanding of security solutions like firewalls, VPNs, and malware management processes. Be ready to give examples of how you've used this knowledge in past roles, especially in an MSSP SOC environment. This will demonstrate your expertise and readiness for the role.
✨Communicate Clearly and Confidently
Since the role involves communicating with external teams and customers, practice articulating your thoughts clearly. You might want to prepare a few scenarios where you successfully resolved incidents or collaborated with others. This will showcase your communication skills and ability to work in a team.
✨Understand the Shift Requirements
Be prepared to discuss your willingness to adapt to the 4 on/4 off shift schedule after the initial months. It’s important to show that you’re flexible and understand the demands of the role. Mentioning how you manage work-life balance during shifts can also be a plus.