Job Search and Career Advice Platform

Enable job alerts via email!

Lead SOC Analyst-Splunk SC/DV Cleared-Milton Keynes--655 a day

SmartSourcing Ltd

England

On-site

GBP 100,000 - 125,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading technology firm is seeking a Cyber Security Lead SOC Analyst with extensive experience in Splunk and a strong understanding of networking and systems. Responsibilities include monitoring security tools, incident triage, and initial response to incidents in a DV security cleared environment. Candidates should have a bachelor's degree in Computer Science or Cyber Security and relevant certifications such as CompTIA Security+. This role offers competitive pay and requires working shifts, including weekends and bank holidays.

Qualifications

  • Experience working in a Security Operations Centre (SOC) with Splunk.
  • Ability to demonstrate foundational knowledge of networking and operating systems.
  • Certifications like CompTIA Security+ or CySA+ are beneficial.

Responsibilities

  • Monitor security tools to detect suspicious activity.
  • Analyse alerts and logs to assess security incidents.
  • Perform initial containment actions for confirmed incidents.
  • Create detailed tickets and reports for incidents.
  • Provide guidance to junior members of the team.
  • Assist in the maintenance of security tools.

Skills

Splunk in Security Operations Centre (SOC)
Networking concepts (TCP/IP, DNS)
Operating systems (Windows, Linux)
CompTIA Security+ certification
Cybersecurity Analyst (CySA+)

Education

Bachelor’s degree in Computer Science or Cyber Security
Job description
Cyber Security Lead SOC Analyst – Splunk – DV Security Cleared

Location: Milton Keynes, Bucks; commutable from Northampton, East Midlands, Bedford, Luton, Peterborough.

Pay: GBP 655 per day – Umbrella Company.

Working in a DV (Developed Vetting) Security cleared environment. You will hold a current DV or SC Security Clearance or be eligible to undertake.

The role requires working as part of a 24/7 shift pattern, including weekends and bank holidays.

Start in the New Year.

Skills and Experience Required
  • Experience of Splunk in a Security Operations Centre (SOC)
  • A bachelor’s degree in Computer Science, Cyber Security
  • Foundational understanding of networking concepts (TCP/IP, DNS, etc.), operating systems (Windows, Linux), and common cyber attack techniques
  • Certifications such as CompTIA Security+, Cybersecurity Analyst (CySA+), or similar (a significant bonus)
Key Responsibilities
  • Continuous Monitoring – monitor security tools, including SIEM systems, to detect suspicious activity; first to see potential threats and respond efficiently.
  • Incident Triage – analyse alerts and logs to determine if an event is a genuine security incident or a false positive; follow established procedures to classify and prioritise incidents.
  • Initial Incident Response – for confirmed incidents, perform initial containment actions (e.g., isolate affected systems) and escalates to Level 2 or 3 analysts.
  • Reporting and Documentation – create detailed tickets and reports for all detected incidents, documenting findings and actions.
  • Managing – provide direction and support to the junior member of the shift and provide handover to the next shift leader.
  • Tool Management – assist in the maintenance and optimisation of security tools, ensuring they work correctly and effectively.

Please apply online in the first instance.

SmartSourcing are a Disability Confident Employer and we promote, celebrate and value diversity; we are committed to promoting equality and inclusion for all.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.