Job Search and Career Advice Platform

Enable job alerts via email!

L3 SOC Analyst

GCS

Greater London

On-site

GBP 100,000 - 125,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity firm in Greater London seeks an experienced L3 SOC Analyst. In this role, you'll lead investigations and responses to complex security incidents, analyse and triage SIEM alerts, and engage with technical stakeholders. Ideal candidates will have strong SOC experience, knowledge of SIEM and cybersecurity protocols, as well as the ability to write KQL for Microsoft Sentinel. This contract position offers £500 per day and is inside IR35.

Qualifications

  • 5+ years of experience in a senior SOC or cybersecurity role.
  • Proven experience handling complex security incidents.
  • Hands-on experience with enterprise-level SOC operations.

Responsibilities

  • Lead investigation and response to complex security incidents.
  • Analyse and triage SIEM alerts with root cause analysis.
  • Tune and optimise SOC tools including SIEM platforms.

Skills

Incident response
Root cause analysis
SIEM analysis
Cybersecurity knowledge
KQL for Microsoft Sentinel

Tools

SIEM platforms
MFA
PAM
Job description

L3 SOC AnalystContract | £500 per day | Inside IR35

We are supporting a client seeking an experienced L3 SOC Analyst to provide senior-level incident response and investigation within a Security Operations Centre.

Key Responsibilities
  • Lead investigation and response to complex security incidents escalated from L1/L2.
  • Analyse and triage SIEM alerts, performing root cause analysis and remediation.
  • Act as a senior escalation point for cyber incidents, engaging technical and business stakeholders.
  • Tune and optimise SOC tools, including SIEM platforms.
  • Support risk-based security controls across IT and OT environments.
  • Participate in an on-call rota.
Required Experience
  • Strong experience in an L3 SOC or senior cyber security role.
  • Hands-on SOC experience within an enterprise environment.
  • In-depth knowledge of SIEM, MFA, and PAM.
  • Solid understanding of IT infrastructure and networking.
  • Experience writing KQL for Microsoft Sentinel.

Apply now to discuss further details.

GCS is acting as an Employment Business in relation to this vacancy.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.