At a Glance
- Tasks: Lead security incident responses and mentor junior analysts in a dynamic cyber security environment.
- Company: Join a top-tier technology MSSP focused on innovative security solutions.
- Benefits: Enjoy a competitive salary, shift allowance, and a comprehensive corporate benefits package.
- Why this job: Be at the forefront of cyber security, tackling real-world threats and shaping industry standards.
- Qualifications: Experience as a Level 3 SOC Analyst or strong Level 2 with leadership skills required.
- Other info: Opportunity for professional growth and involvement in cutting-edge Microsoft technologies.
The predicted salary is between 52000 - 78000 £ per year.
Social network you want to login/join with:
Salary – Up to £65,000 + Shift Allowance Bonus + Additional Corporate Benefits Package!
The Client: A leading technology MSSP requires a security operations analyst (L3)
Job Description:
As an experienced Senior Cyber Security Operations Analyst, you will be responsible for handling security incidents received/escalated from the CSOC Analyst (Tier 1 or Tier 2) and perform a business impact analysis on the security incident.
You will leverage a deep understanding of information security technologies, aid in triaging threat intelligence from multiple sources, add contextual information to the security incident, perform additional analysis, and based on the business impact, recommend the response actions and escalation path.
You will be guided by Threat Intelligence which is actionable information (IOCs/TTPs), conduct threat hunting activities; leveraging and analyzing sources of information as available through the SIEM, in addition to identifying and investigating potential suspicious activity, as well as helping organizations identify, isolate, and contain security issues.
You will support the initial implementation of new security-related Microsoft technologies, including Microsoft Sentinel, MDE, MDI, and Defender for Cloud.
What You’ll Be Doing:
- Oversee completion of day-to-day checklist(s), including log review, management report scheduling & running, alert analysis, and escalation follow-up.
- Remain current on cyber security trends and intelligence (open source and commercial) to guide the security analysis & identification capabilities of the CSOC team.
- Provide oversight, guidance, and mentoring to L2 & L3 analysts, and fulfill SOC Manager responsibilities in the absence of the SOC Manager.
- Manage a number of analysts as part of a virtual team of L1 and L2 analysts, including objectives setting, performance management/reviews, training & development, and BAU activities including shift cover.
- Support on-call arrangements as part of a Rota, to support L1 Analysts working out of hours.
- Support Major Incident Response activity from a Protective Monitoring perspective, including supporting teams in identification, containment, and remediation of security-related threats.
- Provide timely advice and guidance on the response action plans for events and incidents based on incident type and severity.
- Identify, create, and implement improvements to procedures and processes, with the SOC Manager’s approval.
- Identify opportunities for SOC and client SIEM platform configuration improvements, use case development, monitoring rule creation, tuning & optimization.
- Stakeholder and Client Reporting, and engagement.
- Assist in architectural design to facilitate the onboarding of new information systems, including the assessment, parsing, onboarding of log sources, and use case and rule development.
What we’re looking for:
- Level 3 SOC Analyst / Senior Cyber Security and security operations experience OR a Level 2 SOC Analyst who has experience assisting in L3 activities at a good level.
- Experience in managing Microsoft Sentinel as an MSSP, including Lighthouse, and management and multi-customer environments using DevOps.
- Experience of onboarding, tuning, reporting, and configuring SIEM solutions.
- Experience of threat intelligence.
- Leadership and mentoring experience and skills.
- Understanding of low-level concepts including operating systems and networking.
- Commercial experience in Penetration Testing and/or Security Monitoring.
- Understanding of networking and infrastructure design.
- Knowledge/experience of one or more System administration (Linux, Windows, Mac).
- Self-motivated individual with a flexible approach to working.
- Excellent interpersonal skills with the ability to explain technical problems to non-technical business stakeholders at all levels.
- Strong written and oral communication skills.
- Active or ability to obtain SC clearance.
Preferred Qualifications & Experience:
- IT Certifications, including Network+, Security+.
- Protective Monitoring/SOC Certifications, including CySA+.
- Cyber Security Certifications, including CISMP, CISSP.
- Experience with various Microsoft Technologies, including Microsoft Defender for Endpoint, Identity, and Cloud.
- Experience with SIEM platforms, including IBM QRadar, Microsoft Sentinel, and LogRhythm.
- In-depth experience with Microsoft Sentinel, including use case and rule development, workbook/playbook creation, KQL & Logic Apps/SOAR.
So, if you feel your skills and experience align with the prerequisites for this role, then please get in touch and apply directly.
Carbon60, Lorien & SRG – The Impellam Group STEM Portfolio are acting as an Employment Business in relation to this vacancy.
#J-18808-Ljbffr
L3 SOC Analyst, Greater London employer: TN United Kingdom
Contact Detail:
TN United Kingdom Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land L3 SOC Analyst, Greater London
✨Tip Number 1
Make sure to stay updated on the latest cyber security trends and technologies, especially those related to Microsoft Sentinel and other tools mentioned in the job description. This knowledge will not only help you during interviews but also demonstrate your commitment to the field.
✨Tip Number 2
Network with professionals in the cyber security field, particularly those who work in SOC environments. Engaging with others can provide insights into the role and may even lead to referrals or recommendations for the position.
✨Tip Number 3
Consider participating in relevant online forums or communities focused on threat intelligence and SOC operations. Sharing your knowledge and learning from others can enhance your understanding and make you a more attractive candidate.
✨Tip Number 4
If you have experience with SIEM platforms, be prepared to discuss specific use cases or scenarios where you've successfully implemented improvements. Real-world examples can set you apart from other candidates and showcase your expertise.
We think you need these skills to ace L3 SOC Analyst, Greater London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in cyber security operations, particularly your work with Microsoft Sentinel and SIEM solutions. Use specific examples that demonstrate your skills in threat intelligence and incident response.
Craft a Strong Cover Letter: In your cover letter, express your passion for cyber security and detail how your background aligns with the responsibilities of the L3 SOC Analyst role. Mention your leadership experience and ability to mentor others, as these are key aspects of the position.
Highlight Relevant Certifications: List any IT and cyber security certifications you hold, such as Network+, Security+, CySA+, or CISSP. This will strengthen your application and show that you have the necessary qualifications for the role.
Showcase Communication Skills: Since the role requires explaining technical issues to non-technical stakeholders, provide examples in your application of how you've successfully communicated complex information in the past. This could be through presentations, reports, or team collaborations.
How to prepare for a job interview at TN United Kingdom
✨Showcase Your Technical Expertise
Be prepared to discuss your experience with Microsoft Sentinel and other SIEM platforms in detail. Highlight specific instances where you've successfully managed security incidents or implemented improvements in security processes.
✨Demonstrate Leadership Skills
Since the role involves mentoring L2 and L3 analysts, share examples of how you've led teams or guided colleagues in previous positions. Emphasize your ability to manage objectives and performance reviews.
✨Stay Updated on Cyber Security Trends
Research current trends and threats in cyber security before the interview. Being able to discuss recent developments will show your commitment to staying informed and your proactive approach to threat intelligence.
✨Communicate Clearly with Non-Technical Stakeholders
Prepare to explain complex technical concepts in simple terms. This is crucial as you'll need to communicate effectively with business stakeholders who may not have a technical background.