Job Search and Career Advice Platform

Enable job alerts via email!

Lead SOC Analyst-SC/DV Cleared-East Midlands 655

SmartSourcing Ltd

Milton Keynes

Hybrid

GBP 100,000 - 125,000

Full time

2 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A technology security firm based in Milton Keynes is seeking a Cyber Security Lead SOC Analyst to oversee incident monitoring and response. This role demands strong skills in SPLUNK and foundational knowledge of networking and operating systems. Candidates must possess a Bachelor’s degree in Computer Science or Cyber Security and hold a current DV or SC Security Clearance. The position involves continuous monitoring, incident triage, and providing support to junior shift members in a dynamic work environment. Competitive pay of £655 a day is offered for this role.

Qualifications

  • Must hold a current DV or SC Security Clearance, or be eligible to undertake.
  • Experience in monitoring security tools and incident response.
  • Ability to create detailed tickets and reports for incidents.

Responsibilities

  • Monitor security tools to detect suspicious activity.
  • Analyse alerts to determine genuine incidents versus false positives.
  • Perform containment actions for incidents.
  • Create detailed tickets and reports for all incidents.
  • Provide support to junior team members.
  • Assist in maintenance of security tools.

Skills

Experience with SPLUNK in a Security Operations Centre (SOC)
Foundational understanding of networking concepts (TCP/IP, DNS)
Operating systems (Windows, Linux)
Certifications such as CompTIA Security+ or CySA+

Education

Bachelor’s degree in Computer Science or Cyber Security
Job description
Cyber Security Lead SOC Analyst

DV Security Cleared environment. Based in Milton Keynes, with commutable options from Northampton, East Midlands, Bedford, Luton, and Peterborough.

Pay – £655 a day – Umbrella Company

Working in a 24/7 shift pattern, including weekends and bank holidays.

Required Security Clearance

Must hold a current DV or SC Security Clearance, or be eligible to undertake.

Skills and Experience Required
  • Experience with SPLUNK in a Security Operations Centre (SOC).
  • Bachelor’s degree in Computer Science, Cyber Security, or a related field.
  • Foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber‑attack techniques.
  • Certifications such as CompTIA Security+, Cybersecurity Analyst (CySA+), or similar are a significant bonus.
Key Responsibilities
  • Continuous Monitoring – monitor security tools, including SIEM systems, to detect suspicious activity and respond efficiently to potential threats.
  • Incident Triage – analyse alerts and logs to determine genuine incidents versus false positives, following established procedures.
  • Initial Incident Response – perform containment actions such as isolating affected systems, and escalated to Level 2 or 3 analysts for deeper investigation.
  • Reporting and Documentation – create detailed tickets and reports for all incidents, documenting findings and actions taken.
  • Managing – provide direction and support to junior shift members, and hand over responsibilities to the next shift leader.
  • Tool Management – assist in the maintenance and optimisation of security tools, ensuring they function correctly and effectively.

SmartSourcing is a Disability Confident Employer and promotes, celebrates and values diversity. We are committed to promoting equality and inclusion for all.

To apply, please submit online.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.