SOC Analyst | Remote Contract | Outside IR35
Our client is looking for two experienced SOC Analysts to join them on a 6-month initial contract, working remotely.
This role is operating outside of IR35. Candidates must be based in the UK.
Key Responsibilities:
- Monitor and investigate security alerts using SIEM tools (e.g., Splunk, Microsoft Sentinel).
- Conduct threat-hunting activities to proactively identify suspicious behavior and potential threats.
- Analyze logs and network traffic to identify anomalies.
- Collaborate with incident response teams to contain and remediate threats.
- Create and maintain documentation, playbooks, and incident reports.
- Continuously improve SOC processes and detection capabilities.
What We\βre Looking For:
- Strong background in cybersecurity with hands-on SOC experience.
- Proficiency in threat-hunting methodologies and investigative techniques.
- Experience with SIEM platforms such as Splunk, Sentinel, or similar.
- Solid understanding of security frameworks, malware analysis, and network protocols.
- Strong analytical and problem-solving skills.
- Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified) are a plus.
Locations
Warrington
Cheshire
SOC Analyst | Remote Contract | Outside IR35 employer: Trilogy International, A Korn Ferry Company
Join a forward-thinking organisation that values innovation and collaboration, offering SOC Analysts the chance to work remotely while contributing to critical cybersecurity initiatives. With a strong emphasis on professional development, employees are encouraged to enhance their skills through training and certifications, all within a supportive work culture that prioritises teamwork and continuous improvement. This role not only provides competitive compensation but also the flexibility of remote work, making it an ideal opportunity for those seeking a meaningful career in cybersecurity.
Contact Detail:
Trilogy International, A Korn Ferry Company Recruiting Team