Enable job alerts via email!

L2 SOC Analyst - Systems Integrator

Hamilton Barnes Associates Limited

United Kingdom

On-site

GBP 80,000 - 100,000

Part time

Today
Be an early applicant

Job summary

A leading cybersecurity firm in the United Kingdom is seeking an experienced L2 SOC Analyst to monitor and respond to security incidents. The role requires expertise in threat analysis and the use of SIEM tools like Crowdstrike and Splunk. Ideal candidates have a minimum of 5 years of experience and strong problem-solving skills. Join to be the first line of defense against evolving cyber threats.

Qualifications

  • 5+ years of experience as a Tier 2 or 3 SOC Analyst.
  • Experience with SIEM tools in a large organization.
  • Ability to conduct advanced correlation analysis.

Responsibilities

  • Investigate escalated security incidents.
  • Conduct in-depth analysis of incidents using threat intelligence.
  • Leverage SIEM platforms to develop new use cases.

Skills

SIEM tools expertise
Incident investigation
Threat analysis
Communication skills
Analytical problem solving

Tools

Crowdstrike
Splunk
Microsoft Defender
Job description
Overview

Ready to detect, respond, and contain threats before they escalate?

Join a cybersecurity solutions provider recognised for delivering advanced identity, threat detection, and SOC services. With a reputation for innovation and trusted partnerships, the organisation continues to help enterprises defend against evolving cyber risks.

The team is hiring an L2 SOC Analyst to monitor, investigate, and respond to security incidents. The role will focus on analysing alerts, performing in-depth investigations, escalating complex threats, and supporting continuous improvements in SOC processes and tools.

Be the frontline defender where speed meets precision. Apply now!

Responsibilities
  • Investigate escalated security incidents and determine root causes.
  • Conduct in-depth analysis of incidents using threat intelligence (IOCs, TTPs) alongside host, network, and identity data sets.
  • Leverage SIEM platforms (Crowdstrike SIEM, Splunk, Microsoft Defender) to develop and implement new use cases.
  • Tune and reduce false alerts.
  • Lead investigations through resolution.
  • Monitor and analyze events across multiple operating systems (Windows, macOS, Linux).
  • Conduct proactive threat hunts across diverse data sources (host, vulnerability, threat, network, Active Directory).
  • Collaborate with stakeholders to coordinate timely incident response efforts.
  • Design and implement incident response plans, including alert definitions, escalation workflows, and runbooks.
  • Produce clear and comprehensive incident documentation tailored to both technical and management audiences.
  • Perform forensic investigations as needed.
  • Partner with vendors to implement new SOC use cases.
Requirements
  • 5+ years of recent experience as a Tier 2 or 3 SOC Analyst in a large organization (government or critical infrastructure experience preferred).
  • Strong expertise with SIEM tools, including Crowdstrike, Splunk, and Microsoft Defender.
  • Proven track record designing and implementing SOC use cases and response runbooks.
  • Demonstrated ability to conduct advanced correlation analysis across diverse security data sources.
  • Experience leading complex investigations and collaborating with cross-functional teams.
  • Strong experience setting up alert rules and managing alert workflows.
  • Excellent documentation skills for technical and executive-level reporting.
  • Proactive, curious, and analytical problem solver.
  • Strong qualitative and quantitative analysis abilities.
  • Adaptive and resilient in fast-paced, dynamic environments.
  • Excellent communication and stakeholder engagement skills.

Salary: €350 per day

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.