Enable job alerts via email!

L3 SOC Analyst - Consultancy

Hamilton Barnes Associates Limited

Greater Manchester

On-site

GBP 80,000 - 100,000

Full time

16 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

A large enterprise organization is seeking an experienced Level 3 SOC Analyst for an initial 6-month rolling contract. This role offers the opportunity to lead investigations, conduct threat hunting, and contribute to a high-performing cybersecurity team focused on protecting enterprise assets.

Benefits

View to Extension

Qualifications

  • Over 5 years of experience in cybersecurity, including 2 years in a Level 3 SOC.
  • Expert-level proficiency with Microsoft Sentinel and KQL.
  • Strong knowledge of the MITRE ATT&CK framework and adversary TTPs.

Responsibilities

  • Lead investigations and responses for high-severity security incidents.
  • Conduct proactive threat hunting using Microsoft Sentinel.
  • Develop and fine-tune analytic rules and automation playbooks.

Skills

Cybersecurity
Microsoft Sentinel
Incident Response
Threat Hunting
Digital Forensics
Windows Security
Linux Security
Network Security Principles
MITRE ATT&CK framework

Tools

Microsoft Defender for Endpoint
Microsoft Defender for Identity
Microsoft 365
SOAR Platforms

Job description

A large enterprise organisation is seeking an experiencedLevel 3 SOC Analyst for an initial 6-month rolling contract. This is a key role within a mature and well-established Security Operations Centre, offering the opportunity to work on complex threats and contribute to a high-performing cybersecurity function.

This is a challenging, rewarding role for a seasoned SOC professional looking to make a tangible impact. Apply now to join a team focused on protecting enterprise assets against evolving cyber threats.

Key Responsibilities:

  • Lead investigations and response efforts for high-severity security incidents.
  • Conduct proactive threat hunting using Microsoft Sentinel and the Defender suite.
  • Develop and fine-tune analytic rules, workbooks, and automation playbooks in Sentinel.
  • Perform deep-dive analysis of malware, phishing, and lateral movement techniques.
  • Collaborate with engineering teams to optimise Microsoft security tool integrations.
  • Maintain and enhance incident response procedures and documentation.

Skills/Must have:

  • Over 5 years of experience in cybersecurity, including a minimum of 2 years in a Level 3 SOC or equivalent role.
  • Expert-level proficiency with Microsoft Sentinel, including KQL, custom analytic rules, and automation.
  • Hands-on experience with Microsoft Defender for Endpoint, Identity, and Office 365.
  • Strong knowledge of the MITRE ATT&CK framework, threat intelligence, and adversary TTPs.
  • Solid understanding of Windows, Linux, and core network security principles.
  • Skilled in incident response, digital forensics, and proactive threat hunting.
  • Experience working with SOAR platforms and building automated workflows.

Benefits:

  • View to Extension

Salary:

  • Up to £575 Per Day
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.