At a Glance
- Tasks: Monitor and respond to security incidents using Microsoft Sentinel and LogRhythm.
- Company: Join a dynamic Security Operations Center in the heart of London.
- Benefits: Enjoy competitive pay, flexible working options, and opportunities for professional growth.
- Why this job: Be part of a crucial team protecting digital assets and enhancing cybersecurity strategies.
- Qualifications: Experience with Microsoft Sentinel and LogRhythm is essential; certifications are a bonus.
- Other info: This role requires SC clearance and offers an outside IR35 contract.
The predicted salary is between 48000 - 72000 £ per year.
*** SC Cleared*** Required
OUTSIDE I35
We are seeking a skilled and proactive SOC Engineer with strong expertise in Microsoft Sentinel and LogRhythm to join our Security Operations Center team. The ideal candidate will be responsible for monitoring, analyzing, and responding to security incidents, optimizing SIEM configurations, and contributing to threat detection and response strategies. This role requires hands-on experience with both platforms and a deep understanding of cybersecurity principles and incident management.
Key Responsibilities:
-
Monitor and investigate security alerts from Microsoft Sentinel and LogRhythm.
-
Analyze logs, network traffic, and other data sources to detect threats and suspicious activities.
-
Develop and tune detection rules, analytics, and alerting logic in both SIEM platforms.
-
Collaborate with incident response teams to contain and remediate security incidents.
-
Create dashboards, workbooks, and reports for stakeholders.
-
Perform threat hunting activities and support continuous improvement of SOC processes.
-
Maintain and enhance use cases, playbooks, and automation (e.g., with Logic Apps or SOAR).
-
Ensure SIEM solutions are properly integrated with data sources (e.g., firewalls, endpoints, cloud services).
-
Support compliance and audit efforts through effective logging and reporting.
-
Provide subject matter expertise for Sentinel and LogRhythm configuration, maintenance, and optimization.
Requirements:Technical Skills:
-
Proven experience with Microsoft Sentinel: KQL queries, analytic rules, data connectors, workbooks, etc.
-
Proficiency with LogRhythm SIEM: AI Engine rules, SmartResponse, log source integration.
-
Certifications such as Microsoft SC-200, LogRhythm Certified Professional, CEH, GCIA, or CISSP are a plus.
SOC Engineer - SC Cleared Contract in City of London employer: Run-Time Group Ltd
Contact Detail:
Run-Time Group Ltd Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Engineer - SC Cleared Contract in City of London
✨Tip Number 1
Familiarise yourself with Microsoft Sentinel and LogRhythm by exploring their documentation and online resources. This will not only enhance your understanding but also allow you to speak confidently about your experience during interviews.
✨Tip Number 2
Engage in relevant online communities or forums focused on cybersecurity and SIEM tools. Networking with professionals in the field can provide insights into the latest trends and may even lead to referrals for job opportunities.
✨Tip Number 3
Consider obtaining certifications related to Microsoft Sentinel and LogRhythm, such as the Microsoft SC-200 or LogRhythm Certified Professional. These credentials can significantly boost your profile and demonstrate your commitment to the field.
✨Tip Number 4
Prepare for technical interviews by practising common SOC Engineer scenarios, such as incident response and threat detection. Being able to articulate your thought process and problem-solving skills will set you apart from other candidates.
We think you need these skills to ace SOC Engineer - SC Cleared Contract in City of London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience with Microsoft Sentinel and LogRhythm. Include specific examples of how you've monitored, analysed, and responded to security incidents in previous roles.
Craft a Strong Cover Letter: In your cover letter, express your enthusiasm for the SOC Engineer role and detail your hands-on experience with SIEM platforms. Mention any relevant certifications and how they align with the job requirements.
Showcase Technical Skills: Clearly outline your technical skills related to KQL queries, analytic rules, and log source integration. Use bullet points to make this information easy to read and impactful.
Highlight Collaboration Experience: Since the role involves working with incident response teams, include examples of past collaborations. Describe how you contributed to team efforts in threat detection and incident management.
How to prepare for a job interview at Run-Time Group Ltd
✨Showcase Your Technical Skills
Be prepared to discuss your hands-on experience with Microsoft Sentinel and LogRhythm. Highlight specific projects where you've used KQL queries or developed analytic rules, as this will demonstrate your expertise and relevance to the role.
✨Understand Cybersecurity Principles
Brush up on key cybersecurity concepts and incident management strategies. Being able to articulate these principles during the interview will show that you have a solid foundation and can contribute effectively to the team.
✨Prepare for Scenario-Based Questions
Expect questions that assess your problem-solving skills in real-world scenarios. Think of examples where you've monitored security alerts or responded to incidents, and be ready to explain your thought process and actions taken.
✨Demonstrate Collaboration Skills
Since the role involves working with incident response teams, be ready to discuss how you've collaborated with others in past roles. Share examples of how you contributed to team efforts in threat detection and response.