At a Glance
- Tasks: Monitor security systems, analyse alerts, and support incident investigations.
- Company: Join Systal, a global leader in network, cloud, and security transformation.
- Benefits: Enjoy competitive salary, unrivalled training, and a fantastic working environment.
- Why this job: Be part of a high-performing culture that values innovation and customer experience.
- Qualifications: Bachelor’s degree in IT or Cybersecurity; experience in IT Security preferred.
- Other info: Hybrid work model with state-of-the-art offices and remote teams.
The predicted salary is between 28800 - 43200 £ per year.
We are Systal: a global managed network, cloud and security transformation specialist. We provide complex and strategic technology services for enterprise businesses, managing 200,000+ assets across 93 countries. These services help our customers achieve strategic technology transformation and maximise the business value, security and innovative potential of their IT infrastructure.
We are seeking enthusiastic, dedicated and detail-oriented Level 1 SOC Analyst to join our UK based Security Operations Centre (SOC). The successful candidate will be responsible for the initial analysis and triage of security alerts, monitoring security systems, and supporting the development of security event investigation and analysis within a large Organisational Environment. This role is critical in identifying and responding to security incidents to protect our customers' information assets.
What will you be doing?
- Monitor Security Information & Event Management (SIEM) Tools: Continuously monitor SIEM tools to pro-actively engage with and investigate potential security incidents.
- Incident Identification and Triage: Identify, analyse, and prioritize security incidents, escalating them as necessary within the team.
- Alert Management: Respond to security alerts, perform initial investigations, and document findings.
- Log Analysis / Threat Hunting: Review and analyse logs from various security tools and devices to identify potential security incidents within customer environments.
- Collaboration: Work closely with other team members and departments to address security issues and improve the security posture.
- Reporting: Create and maintain detailed incident reports, periodic customer reports and documentation for future reference.
- Threat Intelligence: Stay updated with the latest security threats, vulnerabilities, and technology trends. Assist in the development and maintenance of a comprehensive Threat Intelligence Database and apply this data to assist in the investigation of incidents.
Who are we looking for?
Education: Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field.
Experience: Experience in IT Security or Security Operations Team. Network Security Experience may be considered if SIEM specific qualifications and exposure are evident in the applicant’s experience.
Desirable Certifications (any of):
- Microsoft AZ-200
- ISC2 Certified in Cybersecurity
- CompTIA Security+
- CompTIA CySA+
Demonstrable experience using Microsoft Sentinel or Similar SIEM tooling. Familiarity with security tools and technologies such as SIEM, IDS/IPS, firewalls, and antivirus software. Proficiency in using log analysis tools and basic scripting languages (e.g., Python, PowerShell) is a plus.
Why come and work with us at Systal?
Competitive salary and benefits package. Unrivalled training and development, ensuring you stay at the top of your field. We want you to be the best in your chosen field and continuously support training. Fantastic working environment – our state-of-the-art offices and established remote teams create a positive environment to work in both in person and virtually. Systal’s core is its people. Our culture and success is founded upon having the best performing people in a high performing culture to deliver the best-in-class customer experience. Our mission is to be the world’s most trusted technology services partner – inspiring, empowering and enabling the innovation and transformation of today and tomorrow. And we want you to join us!
Contact Detail:
Systal Technology Solutions Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Operations Center Analyst (Dundee)
✨Tip Number 1
Familiarise yourself with the specific SIEM tools mentioned in the job description, such as Microsoft Sentinel. Having hands-on experience or even completing online tutorials can give you a significant edge during interviews.
✨Tip Number 2
Stay updated on the latest security threats and trends by following relevant blogs, forums, and news sites. This knowledge will not only help you in interviews but also demonstrate your passion for cybersecurity.
✨Tip Number 3
Network with current SOC Analysts or professionals in the field through platforms like LinkedIn. Engaging in discussions can provide insights into the role and may even lead to referrals.
✨Tip Number 4
Prepare to discuss real-world scenarios where you've identified or responded to security incidents. Use the STAR method (Situation, Task, Action, Result) to structure your responses effectively during interviews.
We think you need these skills to ace Security Operations Center Analyst (Dundee)
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in IT Security or Security Operations. Emphasise any specific skills related to SIEM tools, log analysis, and incident management that align with the job description.
Craft a Compelling Cover Letter: Write a cover letter that showcases your enthusiasm for the role and the company. Mention your educational background, relevant certifications, and how your experience makes you a great fit for the SOC Analyst position.
Highlight Relevant Skills: In your application, clearly outline your familiarity with security tools and technologies mentioned in the job description, such as SIEM, IDS/IPS, and scripting languages like Python or PowerShell.
Showcase Continuous Learning: Mention any ongoing training or certifications you are pursuing in cybersecurity. This demonstrates your commitment to staying updated with the latest security threats and trends, which is crucial for the role.
How to prepare for a job interview at Systal Technology Solutions
✨Know Your SIEM Tools
Familiarise yourself with the specific Security Information & Event Management (SIEM) tools that Systal uses. Be prepared to discuss your experience with these tools and how you've used them in past roles to monitor and respond to security incidents.
✨Demonstrate Incident Triage Skills
Be ready to explain your approach to incident identification and triage. Provide examples of how you've prioritised security alerts in previous positions, and discuss any frameworks or methodologies you follow when assessing incidents.
✨Showcase Your Collaboration Experience
Highlight your ability to work within a team and collaborate with other departments. Share specific instances where you’ve worked with colleagues to resolve security issues or improve security posture, as teamwork is crucial in a SOC environment.
✨Stay Updated on Threat Intelligence
Discuss your methods for staying informed about the latest security threats and vulnerabilities. Mention any resources, forums, or certifications you follow to keep your knowledge current, as this shows your commitment to the field.