SOC Analyst

SOC Analyst

London Full-Time 28800 - 42000 £ / year (est.) No home office possible
T

At a Glance

  • Tasks: Join our talent network as a SOC Analyst and tackle digital threats head-on.
  • Company: TWX is a leading recruitment agency focused on Cyber Security careers in the UK.
  • Benefits: Access exclusive job opportunities and receive ongoing support for your career growth.
  • Why this job: Be part of a mission to enhance the UK's cyber security landscape and future-proof your career.
  • Qualifications: Passion for cyber security, experience with SIEM tools, and strong communication skills are key.
  • Other info: Certifications like CISSP or GCIH are a plus but not required.

The predicted salary is between 28800 - 42000 £ per year.

TWX have partnered with a Cyber Security technology and service provider headquartered in Gloucestershire. They are looking to add multiple SOC Analysts to their current team, with the primary aim being to undertake and support the response to a cybersecurity event or incident as well as support other cyber services within the business. The goal of the SOC is to minimise and control the damage resulting from cyber-security incidents, provide practical guidance for the response, coordinate recovery activities, and work to prevent future incidents from reoccurring. Additionally, you will be helping with the monitoring of information security controls within the business by analysing alerts received in line with our information security policies and practices and dealing with any/all security incidents. WHY? Working within a comprehensive team with decades of experience in Cyber and Incident Response £40K – £60K DOE Additional Training Budget 23 days Annual Leave + Bank Holidays + 3 days between Christmas and New Year. Private Healthcare Buyback Scheme Mostly Remote Working – With irregular trips to the HQ in Cirencester or a serviced office space in Manchester (Once a month or once a quarter, as well as an expensed on-boarding trip to the HQ shortly after start) 37.5 hours per week within a UK based rapid growth Cyber Business with a diverse client base + Early finish 1 day per week Vendor training and internal skills and knowledge transferring Please note, this is a 24/7 SOC with 8 hour rotational shift patterns, please see (or request) corresponding rota for more information. WHAT IS A TYPICAL DAY Reviewing & Triage initial alerts First point of escalation Initial investigation Clarify incident severity Knowledge of security methodologies for investigation Comfortable with RAW output Threat Intel Info – against alerts Threat Hunting Internal Security and Log Management On top of the SOC Management you can be working on other services:- Dark Web monitoring service Guiding and Shaping Ideas for Crisis Simulations (often around Threat hunting and what happens following one of the well known cyber threats all the way from insider threat and supply chain compromise to Ransomware. Client Risk Compromise and Supply Chain Risk CIS Based Gap analysis with our customers reviewing key parts of their cyber stack. ACCOUNTABLITIES AND ACTIVITIES Analytics Use raw log sources and other security and operational tools to monitor and analyse the security posture of the IT estate and identify anomalous activity and behaviors. Investigates defines and resolves complex issues. Produce incident reports to present activity and outcome of operational security services and activity. Select appropriately from applicable standards, methods, tools and applications. Incident management Aid with the investigation of security breaches following established procedures and make sure any recommended follow up actions are taken to ensure a reduction in the likelihood of re-occurrence. Co-ordinate and manage all Incident Responses. Make sure that all security incidents have been correctly prioritised and diagnose in according to agreed procedures. Investigate the causes of incidents, document findings and seek resolution. Ensure the escalation of any unresolved incidents has been completed according to agreed procedures. Oversee the facilitation of recovery, following the resolution of incidents. Make sure security incidents have been documented and closed according to agreed procedures. Serve as a backup for security operations emergency response. Facilitate collaboration between stakeholders who share common objectives. Information security Review, update and, when needed, create IR polices, playbooks and standard operating procedures documentation. Use security tools and, where appropriate, develop scripts of your own tools to assist with the ongoing analysis of a security event or incident. Provide advice and guidance to other teams within the business on good practice and maintain relevant and current industry knowledge. In relation to active incidents, implement effective security controls to protect core business processes and data. Oversee, in relation to active Incidents, the operation and optimisation of security tooling/products, including network security (IDS/IPS/Firewalls), logging and auditing, event and incident management, and privileged access management controls. Act on security incidents, requests and events to ensure that threats, vulnerabilities and breaches are managed to minimise impact to confidentiality, integrity and availability of systems and data. Understand the requirement for and be able to assist in the creation of security risk, vulnerability assessments, and business impact analysis as required. Security administration Oversee the operation or support the operation of tools that contribute to effective security. Take responsibility to make sure that the onboarding of any enhancements to the security tools, including deployment and on-going management and maintenance is completed. Undertake periodic reviews of relevant information security policies and baseline control standards, by influencing required additional and updated controls based on the content of internal and external audit reports, trends derived from security operations, information from project-based activities and incident resolutions. QUALIFICATIONS, TRAINING AND EXPERIENCE (E= Essential. D= Desirable, P= Preferred) 1.5+ years of experience within an enterprise-level SOC or CSIRT function. (E) Experience with Malware tools and ability to analyse Malware. (E) Security certificates such as: CISSP, CISM, GIAC, GCFE, GISP, GSEC, or CEH, would be preferable considered when discussing compensation, but these are by no means essential or expected for this position. You will have a track record of technical delivery working within a fast-paced environment. In-depth experience in at least one technology tower out of End-User Computing, Hosting, Networks, Cloud, Development. You will be confident in your technical expertise and can present yourself as a technical authority. Capable of breaching. (E) Can take a pragmatic view of the application of technologies; understanding the business application of them and able to identify a balance between the management of risk and the capability for the business to continue to operate. Communicates fluently, orally and in writing, and can present complex information to both technical and non-technical audiences. Experience of Security Monitoring tools. Experience of Vulnerability Management and Threat Intelligence. Knowledge of perimeter and host security intrusion techniques. Knowledge of commonly accepted information security principles and practices, as well as techniques attackers, use to identify vulnerabilities, gain unauthorised access, escalate privileges and access restricted information. You will be able to rapidly absorbs new information and apply it effectively.

SOC Analyst employer: TWX

At TWX, we pride ourselves on being more than just a recruitment agency; we are your partner in navigating the dynamic world of Cyber Security. Our collaborative work culture fosters continuous learning and growth, providing SOC Analysts with unparalleled access to exclusive opportunities across Scotland and the UK. With dedicated support for career advancement and a commitment to matching your aspirations with the right roles, TWX is the ideal place for professionals looking to secure their future in this vital industry.
T

Contact Detail:

TWX Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land SOC Analyst

✨Tip Number 1

Stay updated on the latest cyber security trends and threat landscapes. Follow industry news, blogs, and forums to understand what skills are in demand and how you can position yourself as a valuable candidate.

✨Tip Number 2

Network with professionals in the cyber security field. Attend industry events, webinars, or local meetups to connect with SOC Analysts and other experts who can provide insights and potentially refer you to job openings.

✨Tip Number 3

Familiarize yourself with SIEM tools and other relevant technologies. Hands-on experience or even online courses can help you demonstrate your proficiency, making you a more attractive candidate for SOC Analyst roles.

✨Tip Number 4

Join online communities or forums focused on cyber security. Engaging in discussions and sharing knowledge can help you build your reputation in the field and may lead to job opportunities through referrals.

We think you need these skills to ace SOC Analyst

Cyber Security Knowledge
Incident Response
Security Event Monitoring
SIEM Tool Proficiency
Threat Analysis
Communication Skills
Collaboration
Analytical Thinking
Problem-Solving Skills
Understanding of Cyber Security Trends
Attention to Detail
Certifications (CISSP, GCIH, CISM)
Adaptability
Technical Aptitude

Some tips for your application 🫡

Highlight Your Passion: Make sure to express your passion for cyber security in your application. Share specific examples of how you've identified and mitigated digital threats in the past.

Showcase Relevant Experience: Detail your experience in monitoring, analyzing, and responding to security events. Mention any specific tools or methodologies you have used, especially SIEM tools.

Communicate Your Collaborative Mindset: Emphasize your ability to work collaboratively across teams. Provide examples of how you've effectively communicated with different stakeholders in previous roles.

Include Certifications (if applicable): If you have relevant certifications like CISSP, GCIH, or CISM, be sure to include them in your application. Even if they are not required, they can strengthen your profile.

How to prepare for a job interview at TWX

✨Show Your Passion for Cyber Security

Make sure to express your enthusiasm for cyber security during the interview. Share specific examples of how you've engaged with the field, whether through personal projects, coursework, or relevant experiences.

✨Demonstrate Your Technical Skills

Be prepared to discuss your experience with SIEM tools and any other relevant technologies. Highlight specific incidents where you successfully monitored, analyzed, or responded to security events.

✨Communicate Effectively

Since collaboration is key in this role, practice articulating your thoughts clearly. Be ready to explain complex concepts in a way that non-technical team members can understand.

✨Stay Updated on Cyber Security Trends

Research the latest trends and threat landscapes in cyber security before your interview. Being knowledgeable about current issues will demonstrate your commitment to the field and your ability to adapt to its evolving nature.

SOC Analyst
TWX
T
  • SOC Analyst

    London
    Full-Time
    28800 - 42000 £ / year (est.)

    Application deadline: 2027-01-23

  • T

    TWX

Similar positions in other companies
Europas größte Jobbörse für Gen-Z
discover-jobs-cta
Discover now
>