Enable job alerts via email!

Senior Security Operations Centre (SOC) Analyst

ZipRecruiter

Gosport

On-site

GBP 50,000 - 80,000

Full time

5 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

Join a forward-thinking organization as a Senior Security Operations Centre Analyst, where you will play a crucial role in safeguarding infrastructure. This position offers a rewarding salary and comprehensive benefits, along with the opportunity to work with advanced SIEM tools like Microsoft Sentinel and Splunk. In this role, you will lead incident response efforts, mentor SOC team members, and stay informed about emerging cyber threats. If you have a passion for cybersecurity and a desire to make a meaningful impact, this opportunity is perfect for you.

Qualifications

  • Extensive SOC experience, particularly at SOC Level 2.
  • Mastery of SIEM tools and understanding of network protocols.

Responsibilities

  • Analyze security incidents using advanced SIEM platforms.
  • Lead incident response efforts and enhance detection strategies.
  • Collaborate with team members to improve SOC capabilities.

Skills

SOC Level 2 Experience
SIEM Tools (Microsoft Sentinel, Splunk)
Incident Response
Threat Intelligence Analysis
Analytical Skills
Problem-Solving Skills

Education

Cybersecurity Certifications (CRT, OSCP)

Tools

Microsoft Sentinel
Splunk

Job description

Job Description

Elevate your career to new heights by joining our dynamic team, driven by a profound mission to safeguard infrastructure.

As a Senior Security Operations Centre (SOC) Analyst, you'll enjoy a rewarding salary and comprehensive benefits package designed to support your professional and personal growth. It is advantageous to be SC cleared and eligible for DV clearance.

We are seeking someone with extensive SOC experience, particularly at SOC Level 2. Mastery of SIEM tools such as Microsoft Sentinel and Splunk is essential, along with a deep understanding of network protocols and infrastructure, including TCP/IP, VPNs, and firewalls.

Your expertise in incident response and threat intelligence analysis is crucial, as is familiarity with the Mitre Att&ck framework and advanced threat detection techniques. Strong analytical and problem-solving skills are required, along with the ability to mentor and lead within a SOC team.

Preferred qualifications include cybersecurity certifications like CRT or OSCP, and experience in fine-tuning detection logic and improving SOC processes. Active engagement with the cybersecurity community and awareness of emerging trends will strengthen your application.

In this role, you will:

  1. Analyze security incidents using advanced SIEM platforms (Microsoft Sentinel, Splunk)
  2. Lead incident response efforts and strengthen detection and containment strategies
  3. Tune and maintain detection rules, leveraging frameworks like Mitre Att&ck
  4. Collaborate with team members to enhance SOC capabilities
  5. Stay informed about cyber threats and contribute to best practices
  6. Support the growth of the SOC team through knowledge sharing and mentorship

The successful candidate will join a key organization delivering impactful digital solutions to central government clients, ensuring security and optimizing mission-critical systems. This role offers a unique opportunity to make a meaningful impact in a highly secure and rewarding environment.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.