Enable job alerts via email!

Level 2/3 SOC Analyst - SC Cleared - Inside IR35

JR United Kingdom

London

On-site

GBP 50,000 - 70,000

Full time

Yesterday
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is looking for experienced Level 2/3 SOC Analysts to join their Security Operations Centre in London. This role is crucial for safeguarding sensitive data and systems within a high-profile government security programme. Candidates must possess active SC clearance and have a strong background in SOC environments. Your expertise in Splunk and incident management will be key to ensuring the security and integrity of operations. If you are passionate about cybersecurity and ready to take on a pivotal role, this opportunity is perfect for you.

Qualifications

  • Experience in Level 2/3 SOC Analyst role in public sector or enterprise.
  • Hands-on Splunk experience with relevant certifications.

Responsibilities

  • Support a central government security programme as a SOC Analyst.
  • Maintain integrity and confidentiality of sensitive systems and data.

Skills

Level 2 SOC Analyst
Level 3 SOC Analyst
Splunk
SIEM rule tuning
Incident write-ups

Tools

Splunk

Job description

Social network you want to login/join with:

Level 2/3 SOC Analyst - SC Cleared - Inside IR35, London

Client:

SR2 | Socially Responsible Recruitment | Certified B Corporation

Location:

London, United Kingdom

Job Category:

Other

EU work permit required:

Yes

Job Views:

4

Posted:

08.05.2025

Expiry Date:

22.06.2025

Job Description:

We are seeking two experienced Level 2/3 SOC Analysts to support a high-profile central government security programme. Working within an established Security Operations Centre (SOC), these roles are critical to maintaining the integrity, confidentiality, and availability of sensitive systems and data. Candidates must hold active SC clearance and have hands-on experience working in a government or regulated SOC environment.

Essential Skills & Experience

  • Previous experience in a Level 2 or Level 3 SOC Analyst role within a public sector, defence, or enterprise environment
  • Proven Splunk experience required, with a Splunk Certification (e.g., Core Certified Power User, Enterprise Security Admin) being desirable
  • Familiarity with SIEM rule tuning, alert triage workflows, and common log sources (e.g., Windows, Linux, firewalls, proxies, cloud logs)
  • Strong verbal and written communication skills, with the ability to produce high-quality incident write-ups
  • Active SC Clearance is mandatory
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.