Job Search and Career Advice Platform

Enable job alerts via email!

Lead SOC Analyst-SC/DV-Nr Glasglow-12Mths - Up To 653Pday Umbrella

SmartSourcing Ltd

Glasgow

On-site

GBP 125,000 - 150,000

Part time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A reputable cybersecurity firm in East Kilbride seeks a Cyber Security Lead SOC Analyst with experience in Splunk and the ability to monitor SIEM systems for security incidents. This role requires a bachelor's degree in computer science or Cyber Security, along with a foundational understanding of networking and operating systems. Candidates must hold a current DV or SC Security Clearance or be eligible for it. The position involves guiding junior analysts and responding to incidents effectively.

Qualifications

  • Experience with Splunk in a SOC environment.
  • Bachelor's degree or relevant experience in Cyber Security.
  • Understanding of networking and system concepts.

Responsibilities

  • Monitor SIEM systems for suspicious activity.
  • Analyse alerts to identify security incidents.
  • Respond to and document security incidents.
  • Provide guidance to junior team members.
  • Maintain and optimize security tools.

Skills

Experience of Splunk within a Security Operations Centre (SOC)
Foundational understanding of networking concepts (TCP/IP, DNS, etc.)
Operating systems (Windows, Linux)
Common cyber-attack techniques
Certifications like CompTIA Security+, Cybersecurity Analyst (CySA+)

Education

Bachelor's degree in computer science or Cyber Security
Job description
Cyber Security Lead SOC Analyst, Splunk, DV Security Cleared

Location: East Kilbride, Glasgow base.

Pay: 653 per day – Umbrella Company.

Working environment: Developed Vetting (DV) Security cleared. You must hold a current DV or SC Security Clearance, or be eligible to undertake.

Shift pattern: 24/7 shift pattern, including weekends and bank holidays.

Skills and Experience Required
  • Experience of Splunk within a Security Operations Centre (SOC).
  • A bachelor's degree in computer science, Cyber Security or relevant experience.
  • Foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber-attack techniques.
  • Certifications like CompTIA Security+, Cybersecurity Analyst (CySA+), or a similar certification are a significant bonus.
Key Responsibilities
  • Continuous Monitoring – Monitor SIEM systems to detect suspicious activity. Respond efficiently to defined processes.
  • Incident Triage – Analyse alerts and logs to determine genuine security incidents or false positives. Classify and prioritise incidents following established procedures.
  • Initial Incident Response – Perform containment actions such as isolating affected systems and escalating to Level 2 or 3 analyst for deeper investigation.
  • Reporting and Documentation – Create detailed tickets and reports for all detected incidents, documenting findings and steps taken.
  • Managing – Provide direction and support to the junior member of the shift and handover to the next shift leader.
  • Tool Management – Assist in the maintenance and optimisation of security tools, ensuring they are working correctly and effectively.
Application

Please apply online in the first instance.

Diversity Statement

SmartSourcing is a Disability Confident Employer and we promote, celebrate and value diversity. We are committed to promoting equality and inclusion for all.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.